Oct 12 14:02:41 localhost kernel: Linux version 5.14.0-621.el9.x86_64 (mockbuild@x86-05.stream.rdu2.redhat.com) (gcc (GCC) 11.5.0 20240719 (Red Hat 11.5.0-11), GNU ld version 2.35.2-67.el9) #1 SMP PREEMPT_DYNAMIC Tue Sep 30 07:37:35 UTC 2025 Oct 12 14:02:41 localhost kernel: The list of certified hardware and cloud instances for Red Hat Enterprise Linux 9 can be viewed at the Red Hat Ecosystem Catalog, https://catalog.redhat.com. Oct 12 14:02:41 localhost kernel: Command line: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-621.el9.x86_64 root=UUID=9839e2e1-98a2-4594-b609-79d514deb0a3 ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Oct 12 14:02:41 localhost kernel: BIOS-provided physical RAM map: Oct 12 14:02:41 localhost kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Oct 12 14:02:41 localhost kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Oct 12 14:02:41 localhost kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Oct 12 14:02:41 localhost kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdafff] usable Oct 12 14:02:41 localhost kernel: BIOS-e820: [mem 0x00000000bffdb000-0x00000000bfffffff] reserved Oct 12 14:02:41 localhost kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Oct 12 14:02:41 localhost kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Oct 12 14:02:41 localhost kernel: BIOS-e820: [mem 0x0000000100000000-0x000000023fffffff] usable Oct 12 14:02:41 localhost kernel: NX (Execute Disable) protection: active Oct 12 14:02:41 localhost kernel: APIC: Static calls initialized Oct 12 14:02:41 localhost kernel: SMBIOS 2.8 present. Oct 12 14:02:41 localhost kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Oct 12 14:02:41 localhost kernel: Hypervisor detected: KVM Oct 12 14:02:41 localhost kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Oct 12 14:02:41 localhost kernel: kvm-clock: using sched offset of 4561490427 cycles Oct 12 14:02:41 localhost kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Oct 12 14:02:41 localhost kernel: tsc: Detected 2799.998 MHz processor Oct 12 14:02:41 localhost kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 12 14:02:41 localhost kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 12 14:02:41 localhost kernel: last_pfn = 0x240000 max_arch_pfn = 0x400000000 Oct 12 14:02:41 localhost kernel: MTRR map: 4 entries (3 fixed + 1 variable; max 19), built from 8 variable MTRRs Oct 12 14:02:41 localhost kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 12 14:02:41 localhost kernel: last_pfn = 0xbffdb max_arch_pfn = 0x400000000 Oct 12 14:02:41 localhost kernel: found SMP MP-table at [mem 0x000f5ae0-0x000f5aef] Oct 12 14:02:41 localhost kernel: Using GB pages for direct mapping Oct 12 14:02:41 localhost kernel: RAMDISK: [mem 0x2d858000-0x32c23fff] Oct 12 14:02:41 localhost kernel: ACPI: Early table checksum verification disabled Oct 12 14:02:41 localhost kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Oct 12 14:02:41 localhost kernel: ACPI: RSDT 0x00000000BFFE16BD 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 12 14:02:41 localhost kernel: ACPI: FACP 0x00000000BFFE1571 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 12 14:02:41 localhost kernel: ACPI: DSDT 0x00000000BFFDFC80 0018F1 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 12 14:02:41 localhost kernel: ACPI: FACS 0x00000000BFFDFC40 000040 Oct 12 14:02:41 localhost kernel: ACPI: APIC 0x00000000BFFE15E5 0000B0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 12 14:02:41 localhost kernel: ACPI: WAET 0x00000000BFFE1695 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 12 14:02:41 localhost kernel: ACPI: Reserving FACP table memory at [mem 0xbffe1571-0xbffe15e4] Oct 12 14:02:41 localhost kernel: ACPI: Reserving DSDT table memory at [mem 0xbffdfc80-0xbffe1570] Oct 12 14:02:41 localhost kernel: ACPI: Reserving FACS table memory at [mem 0xbffdfc40-0xbffdfc7f] Oct 12 14:02:41 localhost kernel: ACPI: Reserving APIC table memory at [mem 0xbffe15e5-0xbffe1694] Oct 12 14:02:41 localhost kernel: ACPI: Reserving WAET table memory at [mem 0xbffe1695-0xbffe16bc] Oct 12 14:02:41 localhost kernel: No NUMA configuration found Oct 12 14:02:41 localhost kernel: Faking a node at [mem 0x0000000000000000-0x000000023fffffff] Oct 12 14:02:41 localhost kernel: NODE_DATA(0) allocated [mem 0x23ffd5000-0x23fffffff] Oct 12 14:02:41 localhost kernel: crashkernel reserved: 0x00000000af000000 - 0x00000000bf000000 (256 MB) Oct 12 14:02:41 localhost kernel: Zone ranges: Oct 12 14:02:41 localhost kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 12 14:02:41 localhost kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Oct 12 14:02:41 localhost kernel: Normal [mem 0x0000000100000000-0x000000023fffffff] Oct 12 14:02:41 localhost kernel: Device empty Oct 12 14:02:41 localhost kernel: Movable zone start for each node Oct 12 14:02:41 localhost kernel: Early memory node ranges Oct 12 14:02:41 localhost kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Oct 12 14:02:41 localhost kernel: node 0: [mem 0x0000000000100000-0x00000000bffdafff] Oct 12 14:02:41 localhost kernel: node 0: [mem 0x0000000100000000-0x000000023fffffff] Oct 12 14:02:41 localhost kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000023fffffff] Oct 12 14:02:41 localhost kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 12 14:02:41 localhost kernel: On node 0, zone DMA: 97 pages in unavailable ranges Oct 12 14:02:41 localhost kernel: On node 0, zone Normal: 37 pages in unavailable ranges Oct 12 14:02:41 localhost kernel: ACPI: PM-Timer IO Port: 0x608 Oct 12 14:02:41 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Oct 12 14:02:41 localhost kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Oct 12 14:02:41 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Oct 12 14:02:41 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Oct 12 14:02:41 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 12 14:02:41 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Oct 12 14:02:41 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Oct 12 14:02:41 localhost kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 12 14:02:41 localhost kernel: TSC deadline timer available Oct 12 14:02:41 localhost kernel: CPU topo: Max. logical packages: 8 Oct 12 14:02:41 localhost kernel: CPU topo: Max. logical dies: 8 Oct 12 14:02:41 localhost kernel: CPU topo: Max. dies per package: 1 Oct 12 14:02:41 localhost kernel: CPU topo: Max. threads per core: 1 Oct 12 14:02:41 localhost kernel: CPU topo: Num. cores per package: 1 Oct 12 14:02:41 localhost kernel: CPU topo: Num. threads per package: 1 Oct 12 14:02:41 localhost kernel: CPU topo: Allowing 8 present CPUs plus 0 hotplug CPUs Oct 12 14:02:41 localhost kernel: kvm-guest: APIC: eoi() replaced with kvm_guest_apic_eoi_write() Oct 12 14:02:41 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] Oct 12 14:02:41 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x0009ffff] Oct 12 14:02:41 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000effff] Oct 12 14:02:41 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000f0000-0x000fffff] Oct 12 14:02:41 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xbffdb000-0xbfffffff] Oct 12 14:02:41 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] Oct 12 14:02:41 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] Oct 12 14:02:41 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xff000000-0xfffbffff] Oct 12 14:02:41 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfffc0000-0xffffffff] Oct 12 14:02:41 localhost kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices Oct 12 14:02:41 localhost kernel: Booting paravirtualized kernel on KVM Oct 12 14:02:41 localhost kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 12 14:02:41 localhost kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1 Oct 12 14:02:41 localhost kernel: percpu: Embedded 64 pages/cpu s225280 r8192 d28672 u262144 Oct 12 14:02:41 localhost kernel: pcpu-alloc: s225280 r8192 d28672 u262144 alloc=1*2097152 Oct 12 14:02:41 localhost kernel: pcpu-alloc: [0] 0 1 2 3 4 5 6 7 Oct 12 14:02:41 localhost kernel: kvm-guest: PV spinlocks disabled, no host support Oct 12 14:02:41 localhost kernel: Kernel command line: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-621.el9.x86_64 root=UUID=9839e2e1-98a2-4594-b609-79d514deb0a3 ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Oct 12 14:02:41 localhost kernel: Unknown kernel command line parameters "BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-621.el9.x86_64", will be passed to user space. Oct 12 14:02:41 localhost kernel: random: crng init done Oct 12 14:02:41 localhost kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Oct 12 14:02:41 localhost kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Oct 12 14:02:41 localhost kernel: Fallback order for Node 0: 0 Oct 12 14:02:41 localhost kernel: Built 1 zonelists, mobility grouping on. Total pages: 2064091 Oct 12 14:02:41 localhost kernel: Policy zone: Normal Oct 12 14:02:41 localhost kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 12 14:02:41 localhost kernel: software IO TLB: area num 8. Oct 12 14:02:41 localhost kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1 Oct 12 14:02:41 localhost kernel: ftrace: allocating 49162 entries in 193 pages Oct 12 14:02:41 localhost kernel: ftrace: allocated 193 pages with 3 groups Oct 12 14:02:41 localhost kernel: Dynamic Preempt: voluntary Oct 12 14:02:41 localhost kernel: rcu: Preemptible hierarchical RCU implementation. Oct 12 14:02:41 localhost kernel: rcu: RCU event tracing is enabled. Oct 12 14:02:41 localhost kernel: rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8. Oct 12 14:02:41 localhost kernel: Trampoline variant of Tasks RCU enabled. Oct 12 14:02:41 localhost kernel: Rude variant of Tasks RCU enabled. Oct 12 14:02:41 localhost kernel: Tracing variant of Tasks RCU enabled. Oct 12 14:02:41 localhost kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 12 14:02:41 localhost kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8 Oct 12 14:02:41 localhost kernel: RCU Tasks: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Oct 12 14:02:41 localhost kernel: RCU Tasks Rude: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Oct 12 14:02:41 localhost kernel: RCU Tasks Trace: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Oct 12 14:02:41 localhost kernel: NR_IRQS: 524544, nr_irqs: 488, preallocated irqs: 16 Oct 12 14:02:41 localhost kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Oct 12 14:02:41 localhost kernel: kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____) Oct 12 14:02:41 localhost kernel: Console: colour VGA+ 80x25 Oct 12 14:02:41 localhost kernel: printk: console [ttyS0] enabled Oct 12 14:02:41 localhost kernel: ACPI: Core revision 20230331 Oct 12 14:02:41 localhost kernel: APIC: Switch to symmetric I/O mode setup Oct 12 14:02:41 localhost kernel: x2apic enabled Oct 12 14:02:41 localhost kernel: APIC: Switched APIC routing to: physical x2apic Oct 12 14:02:41 localhost kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Oct 12 14:02:41 localhost kernel: Calibrating delay loop (skipped) preset value.. 5599.99 BogoMIPS (lpj=2799998) Oct 12 14:02:41 localhost kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Oct 12 14:02:41 localhost kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Oct 12 14:02:41 localhost kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Oct 12 14:02:41 localhost kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 12 14:02:41 localhost kernel: Spectre V2 : Mitigation: Retpolines Oct 12 14:02:41 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Oct 12 14:02:41 localhost kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Oct 12 14:02:41 localhost kernel: RETBleed: Mitigation: untrained return thunk Oct 12 14:02:41 localhost kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Oct 12 14:02:41 localhost kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Oct 12 14:02:41 localhost kernel: Speculative Return Stack Overflow: IBPB-extending microcode not applied! Oct 12 14:02:41 localhost kernel: Speculative Return Stack Overflow: WARNING: See https://kernel.org/doc/html/latest/admin-guide/hw-vuln/srso.html for mitigation options. Oct 12 14:02:41 localhost kernel: x86/bugs: return thunk changed Oct 12 14:02:41 localhost kernel: Speculative Return Stack Overflow: Vulnerable: Safe RET, no microcode Oct 12 14:02:41 localhost kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 12 14:02:41 localhost kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 12 14:02:41 localhost kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 12 14:02:41 localhost kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 12 14:02:41 localhost kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Oct 12 14:02:41 localhost kernel: Freeing SMP alternatives memory: 40K Oct 12 14:02:41 localhost kernel: pid_max: default: 32768 minimum: 301 Oct 12 14:02:41 localhost kernel: LSM: initializing lsm=lockdown,capability,landlock,yama,integrity,selinux,bpf Oct 12 14:02:41 localhost kernel: landlock: Up and running. Oct 12 14:02:41 localhost kernel: Yama: becoming mindful. Oct 12 14:02:41 localhost kernel: SELinux: Initializing. Oct 12 14:02:41 localhost kernel: LSM support for eBPF active Oct 12 14:02:41 localhost kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 12 14:02:41 localhost kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 12 14:02:41 localhost kernel: smpboot: CPU0: AMD EPYC-Rome Processor (family: 0x17, model: 0x31, stepping: 0x0) Oct 12 14:02:41 localhost kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Oct 12 14:02:41 localhost kernel: ... version: 0 Oct 12 14:02:41 localhost kernel: ... bit width: 48 Oct 12 14:02:41 localhost kernel: ... generic registers: 6 Oct 12 14:02:41 localhost kernel: ... value mask: 0000ffffffffffff Oct 12 14:02:41 localhost kernel: ... max period: 00007fffffffffff Oct 12 14:02:41 localhost kernel: ... fixed-purpose events: 0 Oct 12 14:02:41 localhost kernel: ... event mask: 000000000000003f Oct 12 14:02:41 localhost kernel: signal: max sigframe size: 1776 Oct 12 14:02:41 localhost kernel: rcu: Hierarchical SRCU implementation. Oct 12 14:02:41 localhost kernel: rcu: Max phase no-delay instances is 400. Oct 12 14:02:41 localhost kernel: smp: Bringing up secondary CPUs ... Oct 12 14:02:41 localhost kernel: smpboot: x86: Booting SMP configuration: Oct 12 14:02:41 localhost kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 Oct 12 14:02:41 localhost kernel: smp: Brought up 1 node, 8 CPUs Oct 12 14:02:41 localhost kernel: smpboot: Total of 8 processors activated (44799.96 BogoMIPS) Oct 12 14:02:41 localhost kernel: node 0 deferred pages initialised in 10ms Oct 12 14:02:41 localhost kernel: Memory: 7765980K/8388068K available (16384K kernel code, 5784K rwdata, 13864K rodata, 4188K init, 7196K bss, 616208K reserved, 0K cma-reserved) Oct 12 14:02:41 localhost kernel: devtmpfs: initialized Oct 12 14:02:41 localhost kernel: x86/mm: Memory block size: 128MB Oct 12 14:02:41 localhost kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 12 14:02:41 localhost kernel: futex hash table entries: 2048 (order: 5, 131072 bytes, linear) Oct 12 14:02:41 localhost kernel: pinctrl core: initialized pinctrl subsystem Oct 12 14:02:41 localhost kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 12 14:02:41 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL pool for atomic allocations Oct 12 14:02:41 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Oct 12 14:02:41 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Oct 12 14:02:41 localhost kernel: audit: initializing netlink subsys (disabled) Oct 12 14:02:41 localhost kernel: audit: type=2000 audit(1760292159.456:1): state=initialized audit_enabled=0 res=1 Oct 12 14:02:41 localhost kernel: thermal_sys: Registered thermal governor 'fair_share' Oct 12 14:02:41 localhost kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 12 14:02:41 localhost kernel: thermal_sys: Registered thermal governor 'user_space' Oct 12 14:02:41 localhost kernel: cpuidle: using governor menu Oct 12 14:02:41 localhost kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 12 14:02:41 localhost kernel: PCI: Using configuration type 1 for base access Oct 12 14:02:41 localhost kernel: PCI: Using configuration type 1 for extended access Oct 12 14:02:41 localhost kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 12 14:02:41 localhost kernel: HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages Oct 12 14:02:41 localhost kernel: HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page Oct 12 14:02:41 localhost kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages Oct 12 14:02:41 localhost kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page Oct 12 14:02:41 localhost kernel: Demotion targets for Node 0: null Oct 12 14:02:41 localhost kernel: cryptd: max_cpu_qlen set to 1000 Oct 12 14:02:41 localhost kernel: ACPI: Added _OSI(Module Device) Oct 12 14:02:41 localhost kernel: ACPI: Added _OSI(Processor Device) Oct 12 14:02:41 localhost kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 12 14:02:41 localhost kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 12 14:02:41 localhost kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 12 14:02:41 localhost kernel: ACPI: _OSC evaluation for CPUs failed, trying _PDC Oct 12 14:02:41 localhost kernel: ACPI: Interpreter enabled Oct 12 14:02:41 localhost kernel: ACPI: PM: (supports S0 S3 S4 S5) Oct 12 14:02:41 localhost kernel: ACPI: Using IOAPIC for interrupt routing Oct 12 14:02:41 localhost kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 12 14:02:41 localhost kernel: PCI: Using E820 reservations for host bridge windows Oct 12 14:02:41 localhost kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Oct 12 14:02:41 localhost kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Oct 12 14:02:41 localhost kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] Oct 12 14:02:41 localhost kernel: acpiphp: Slot [3] registered Oct 12 14:02:41 localhost kernel: acpiphp: Slot [4] registered Oct 12 14:02:41 localhost kernel: acpiphp: Slot [5] registered Oct 12 14:02:41 localhost kernel: acpiphp: Slot [6] registered Oct 12 14:02:41 localhost kernel: acpiphp: Slot [7] registered Oct 12 14:02:41 localhost kernel: acpiphp: Slot [8] registered Oct 12 14:02:41 localhost kernel: acpiphp: Slot [9] registered Oct 12 14:02:41 localhost kernel: acpiphp: Slot [10] registered Oct 12 14:02:41 localhost kernel: acpiphp: Slot [11] registered Oct 12 14:02:41 localhost kernel: acpiphp: Slot [12] registered Oct 12 14:02:41 localhost kernel: acpiphp: Slot [13] registered Oct 12 14:02:41 localhost kernel: acpiphp: Slot [14] registered Oct 12 14:02:41 localhost kernel: acpiphp: Slot [15] registered Oct 12 14:02:41 localhost kernel: acpiphp: Slot [16] registered Oct 12 14:02:41 localhost kernel: acpiphp: Slot [17] registered Oct 12 14:02:41 localhost kernel: acpiphp: Slot [18] registered Oct 12 14:02:41 localhost kernel: acpiphp: Slot [19] registered Oct 12 14:02:41 localhost kernel: acpiphp: Slot [20] registered Oct 12 14:02:41 localhost kernel: acpiphp: Slot [21] registered Oct 12 14:02:41 localhost kernel: acpiphp: Slot [22] registered Oct 12 14:02:41 localhost kernel: acpiphp: Slot [23] registered Oct 12 14:02:41 localhost kernel: acpiphp: Slot [24] registered Oct 12 14:02:41 localhost kernel: acpiphp: Slot [25] registered Oct 12 14:02:41 localhost kernel: acpiphp: Slot [26] registered Oct 12 14:02:41 localhost kernel: acpiphp: Slot [27] registered Oct 12 14:02:41 localhost kernel: acpiphp: Slot [28] registered Oct 12 14:02:41 localhost kernel: acpiphp: Slot [29] registered Oct 12 14:02:41 localhost kernel: acpiphp: Slot [30] registered Oct 12 14:02:41 localhost kernel: acpiphp: Slot [31] registered Oct 12 14:02:41 localhost kernel: PCI host bridge to bus 0000:00 Oct 12 14:02:41 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 12 14:02:41 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Oct 12 14:02:41 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 12 14:02:41 localhost kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Oct 12 14:02:41 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x240000000-0x2bfffffff window] Oct 12 14:02:41 localhost kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Oct 12 14:02:41 localhost kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 conventional PCI endpoint Oct 12 14:02:41 localhost kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 conventional PCI endpoint Oct 12 14:02:41 localhost kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 conventional PCI endpoint Oct 12 14:02:41 localhost kernel: pci 0000:00:01.1: BAR 4 [io 0xc140-0xc14f] Oct 12 14:02:41 localhost kernel: pci 0000:00:01.1: BAR 0 [io 0x01f0-0x01f7]: legacy IDE quirk Oct 12 14:02:41 localhost kernel: pci 0000:00:01.1: BAR 1 [io 0x03f6]: legacy IDE quirk Oct 12 14:02:41 localhost kernel: pci 0000:00:01.1: BAR 2 [io 0x0170-0x0177]: legacy IDE quirk Oct 12 14:02:41 localhost kernel: pci 0000:00:01.1: BAR 3 [io 0x0376]: legacy IDE quirk Oct 12 14:02:41 localhost kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 conventional PCI endpoint Oct 12 14:02:41 localhost kernel: pci 0000:00:01.2: BAR 4 [io 0xc100-0xc11f] Oct 12 14:02:41 localhost kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 conventional PCI endpoint Oct 12 14:02:41 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Oct 12 14:02:41 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Oct 12 14:02:41 localhost kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 conventional PCI endpoint Oct 12 14:02:41 localhost kernel: pci 0000:00:02.0: BAR 0 [mem 0xfe000000-0xfe7fffff pref] Oct 12 14:02:41 localhost kernel: pci 0000:00:02.0: BAR 2 [mem 0xfe800000-0xfe803fff 64bit pref] Oct 12 14:02:41 localhost kernel: pci 0000:00:02.0: BAR 4 [mem 0xfeb90000-0xfeb90fff] Oct 12 14:02:41 localhost kernel: pci 0000:00:02.0: ROM [mem 0xfeb80000-0xfeb8ffff pref] Oct 12 14:02:41 localhost kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 12 14:02:41 localhost kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 conventional PCI endpoint Oct 12 14:02:41 localhost kernel: pci 0000:00:03.0: BAR 0 [io 0xc080-0xc0bf] Oct 12 14:02:41 localhost kernel: pci 0000:00:03.0: BAR 1 [mem 0xfeb91000-0xfeb91fff] Oct 12 14:02:41 localhost kernel: pci 0000:00:03.0: BAR 4 [mem 0xfe804000-0xfe807fff 64bit pref] Oct 12 14:02:41 localhost kernel: pci 0000:00:03.0: ROM [mem 0xfeb00000-0xfeb7ffff pref] Oct 12 14:02:41 localhost kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 conventional PCI endpoint Oct 12 14:02:41 localhost kernel: pci 0000:00:04.0: BAR 0 [io 0xc000-0xc07f] Oct 12 14:02:41 localhost kernel: pci 0000:00:04.0: BAR 1 [mem 0xfeb92000-0xfeb92fff] Oct 12 14:02:41 localhost kernel: pci 0000:00:04.0: BAR 4 [mem 0xfe808000-0xfe80bfff 64bit pref] Oct 12 14:02:41 localhost kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 conventional PCI endpoint Oct 12 14:02:41 localhost kernel: pci 0000:00:05.0: BAR 0 [io 0xc0c0-0xc0ff] Oct 12 14:02:41 localhost kernel: pci 0000:00:05.0: BAR 4 [mem 0xfe80c000-0xfe80ffff 64bit pref] Oct 12 14:02:41 localhost kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 conventional PCI endpoint Oct 12 14:02:41 localhost kernel: pci 0000:00:06.0: BAR 0 [io 0xc120-0xc13f] Oct 12 14:02:41 localhost kernel: pci 0000:00:06.0: BAR 4 [mem 0xfe810000-0xfe813fff 64bit pref] Oct 12 14:02:41 localhost kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Oct 12 14:02:41 localhost kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Oct 12 14:02:41 localhost kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 12 14:02:41 localhost kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Oct 12 14:02:41 localhost kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Oct 12 14:02:41 localhost kernel: iommu: Default domain type: Translated Oct 12 14:02:41 localhost kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 12 14:02:41 localhost kernel: SCSI subsystem initialized Oct 12 14:02:41 localhost kernel: ACPI: bus type USB registered Oct 12 14:02:41 localhost kernel: usbcore: registered new interface driver usbfs Oct 12 14:02:41 localhost kernel: usbcore: registered new interface driver hub Oct 12 14:02:41 localhost kernel: usbcore: registered new device driver usb Oct 12 14:02:41 localhost kernel: pps_core: LinuxPPS API ver. 1 registered Oct 12 14:02:41 localhost kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 12 14:02:41 localhost kernel: PTP clock support registered Oct 12 14:02:41 localhost kernel: EDAC MC: Ver: 3.0.0 Oct 12 14:02:41 localhost kernel: NetLabel: Initializing Oct 12 14:02:41 localhost kernel: NetLabel: domain hash size = 128 Oct 12 14:02:41 localhost kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO Oct 12 14:02:41 localhost kernel: NetLabel: unlabeled traffic allowed by default Oct 12 14:02:41 localhost kernel: PCI: Using ACPI for IRQ routing Oct 12 14:02:41 localhost kernel: PCI: pci_cache_line_size set to 64 bytes Oct 12 14:02:41 localhost kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Oct 12 14:02:41 localhost kernel: e820: reserve RAM buffer [mem 0xbffdb000-0xbfffffff] Oct 12 14:02:41 localhost kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Oct 12 14:02:41 localhost kernel: pci 0000:00:02.0: vgaarb: bridge control possible Oct 12 14:02:41 localhost kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 12 14:02:41 localhost kernel: vgaarb: loaded Oct 12 14:02:41 localhost kernel: clocksource: Switched to clocksource kvm-clock Oct 12 14:02:41 localhost kernel: VFS: Disk quotas dquot_6.6.0 Oct 12 14:02:41 localhost kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 12 14:02:41 localhost kernel: pnp: PnP ACPI init Oct 12 14:02:41 localhost kernel: pnp 00:03: [dma 2] Oct 12 14:02:41 localhost kernel: pnp: PnP ACPI: found 5 devices Oct 12 14:02:41 localhost kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 12 14:02:41 localhost kernel: NET: Registered PF_INET protocol family Oct 12 14:02:41 localhost kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Oct 12 14:02:41 localhost kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Oct 12 14:02:41 localhost kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 12 14:02:41 localhost kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 12 14:02:41 localhost kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Oct 12 14:02:41 localhost kernel: TCP: Hash tables configured (established 65536 bind 65536) Oct 12 14:02:41 localhost kernel: MPTCP token hash table entries: 8192 (order: 5, 196608 bytes, linear) Oct 12 14:02:41 localhost kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Oct 12 14:02:41 localhost kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Oct 12 14:02:41 localhost kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 12 14:02:41 localhost kernel: NET: Registered PF_XDP protocol family Oct 12 14:02:41 localhost kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Oct 12 14:02:41 localhost kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Oct 12 14:02:41 localhost kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Oct 12 14:02:41 localhost kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] Oct 12 14:02:41 localhost kernel: pci_bus 0000:00: resource 8 [mem 0x240000000-0x2bfffffff window] Oct 12 14:02:41 localhost kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Oct 12 14:02:41 localhost kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Oct 12 14:02:41 localhost kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Oct 12 14:02:41 localhost kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x160 took 104975 usecs Oct 12 14:02:41 localhost kernel: PCI: CLS 0 bytes, default 64 Oct 12 14:02:41 localhost kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Oct 12 14:02:41 localhost kernel: software IO TLB: mapped [mem 0x00000000ab000000-0x00000000af000000] (64MB) Oct 12 14:02:41 localhost kernel: ACPI: bus type thunderbolt registered Oct 12 14:02:41 localhost kernel: Trying to unpack rootfs image as initramfs... Oct 12 14:02:41 localhost kernel: Initialise system trusted keyrings Oct 12 14:02:41 localhost kernel: Key type blacklist registered Oct 12 14:02:41 localhost kernel: workingset: timestamp_bits=36 max_order=21 bucket_order=0 Oct 12 14:02:41 localhost kernel: zbud: loaded Oct 12 14:02:41 localhost kernel: integrity: Platform Keyring initialized Oct 12 14:02:41 localhost kernel: integrity: Machine keyring initialized Oct 12 14:02:41 localhost kernel: Freeing initrd memory: 85808K Oct 12 14:02:41 localhost kernel: NET: Registered PF_ALG protocol family Oct 12 14:02:41 localhost kernel: xor: automatically using best checksumming function avx Oct 12 14:02:41 localhost kernel: Key type asymmetric registered Oct 12 14:02:41 localhost kernel: Asymmetric key parser 'x509' registered Oct 12 14:02:41 localhost kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246) Oct 12 14:02:41 localhost kernel: io scheduler mq-deadline registered Oct 12 14:02:41 localhost kernel: io scheduler kyber registered Oct 12 14:02:41 localhost kernel: io scheduler bfq registered Oct 12 14:02:41 localhost kernel: atomic64_test: passed for x86-64 platform with CX8 and with SSE Oct 12 14:02:41 localhost kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 Oct 12 14:02:41 localhost kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 Oct 12 14:02:41 localhost kernel: ACPI: button: Power Button [PWRF] Oct 12 14:02:41 localhost kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Oct 12 14:02:41 localhost kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Oct 12 14:02:41 localhost kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Oct 12 14:02:41 localhost kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 12 14:02:41 localhost kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 12 14:02:41 localhost kernel: Non-volatile memory driver v1.3 Oct 12 14:02:41 localhost kernel: rdac: device handler registered Oct 12 14:02:41 localhost kernel: hp_sw: device handler registered Oct 12 14:02:41 localhost kernel: emc: device handler registered Oct 12 14:02:41 localhost kernel: alua: device handler registered Oct 12 14:02:41 localhost kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Oct 12 14:02:41 localhost kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Oct 12 14:02:41 localhost kernel: uhci_hcd 0000:00:01.2: detected 2 ports Oct 12 14:02:41 localhost kernel: uhci_hcd 0000:00:01.2: irq 11, io port 0x0000c100 Oct 12 14:02:41 localhost kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0001, bcdDevice= 5.14 Oct 12 14:02:41 localhost kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Oct 12 14:02:41 localhost kernel: usb usb1: Product: UHCI Host Controller Oct 12 14:02:41 localhost kernel: usb usb1: Manufacturer: Linux 5.14.0-621.el9.x86_64 uhci_hcd Oct 12 14:02:41 localhost kernel: usb usb1: SerialNumber: 0000:00:01.2 Oct 12 14:02:41 localhost kernel: hub 1-0:1.0: USB hub found Oct 12 14:02:41 localhost kernel: hub 1-0:1.0: 2 ports detected Oct 12 14:02:41 localhost kernel: usbcore: registered new interface driver usbserial_generic Oct 12 14:02:41 localhost kernel: usbserial: USB Serial support registered for generic Oct 12 14:02:41 localhost kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Oct 12 14:02:41 localhost kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 12 14:02:41 localhost kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 12 14:02:41 localhost kernel: mousedev: PS/2 mouse device common for all mice Oct 12 14:02:41 localhost kernel: rtc_cmos 00:04: RTC can wake from S4 Oct 12 14:02:41 localhost kernel: rtc_cmos 00:04: registered as rtc0 Oct 12 14:02:41 localhost kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 Oct 12 14:02:41 localhost kernel: rtc_cmos 00:04: setting system clock to 2025-10-12T18:02:40 UTC (1760292160) Oct 12 14:02:41 localhost kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Oct 12 14:02:41 localhost kernel: amd_pstate: the _CPC object is not present in SBIOS or ACPI disabled Oct 12 14:02:41 localhost kernel: hid: raw HID events driver (C) Jiri Kosina Oct 12 14:02:41 localhost kernel: usbcore: registered new interface driver usbhid Oct 12 14:02:41 localhost kernel: usbhid: USB HID core driver Oct 12 14:02:41 localhost kernel: drop_monitor: Initializing network drop monitor service Oct 12 14:02:41 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input4 Oct 12 14:02:41 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input3 Oct 12 14:02:41 localhost kernel: Initializing XFRM netlink socket Oct 12 14:02:41 localhost kernel: NET: Registered PF_INET6 protocol family Oct 12 14:02:41 localhost kernel: Segment Routing with IPv6 Oct 12 14:02:41 localhost kernel: NET: Registered PF_PACKET protocol family Oct 12 14:02:41 localhost kernel: mpls_gso: MPLS GSO support Oct 12 14:02:41 localhost kernel: IPI shorthand broadcast: enabled Oct 12 14:02:41 localhost kernel: AVX2 version of gcm_enc/dec engaged. Oct 12 14:02:41 localhost kernel: AES CTR mode by8 optimization enabled Oct 12 14:02:41 localhost kernel: sched_clock: Marking stable (1239002119, 144533771)->(1493026243, -109490353) Oct 12 14:02:41 localhost kernel: registered taskstats version 1 Oct 12 14:02:41 localhost kernel: Loading compiled-in X.509 certificates Oct 12 14:02:41 localhost kernel: Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: 72f99a463516b0dfb027e50caab189f607ef1bc9' Oct 12 14:02:41 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' Oct 12 14:02:41 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' Oct 12 14:02:41 localhost kernel: Loaded X.509 cert 'RH-IMA-CA: Red Hat IMA CA: fb31825dd0e073685b264e3038963673f753959a' Oct 12 14:02:41 localhost kernel: Loaded X.509 cert 'Nvidia GPU OOT signing 001: 55e1cef88193e60419f0b0ec379c49f77545acf0' Oct 12 14:02:41 localhost kernel: Demotion targets for Node 0: null Oct 12 14:02:41 localhost kernel: page_owner is disabled Oct 12 14:02:41 localhost kernel: Key type .fscrypt registered Oct 12 14:02:41 localhost kernel: Key type fscrypt-provisioning registered Oct 12 14:02:41 localhost kernel: Key type big_key registered Oct 12 14:02:41 localhost kernel: Key type encrypted registered Oct 12 14:02:41 localhost kernel: ima: No TPM chip found, activating TPM-bypass! Oct 12 14:02:41 localhost kernel: Loading compiled-in module X.509 certificates Oct 12 14:02:41 localhost kernel: Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: 72f99a463516b0dfb027e50caab189f607ef1bc9' Oct 12 14:02:41 localhost kernel: ima: Allocated hash algorithm: sha256 Oct 12 14:02:41 localhost kernel: ima: No architecture policies found Oct 12 14:02:41 localhost kernel: evm: Initialising EVM extended attributes: Oct 12 14:02:41 localhost kernel: evm: security.selinux Oct 12 14:02:41 localhost kernel: evm: security.SMACK64 (disabled) Oct 12 14:02:41 localhost kernel: evm: security.SMACK64EXEC (disabled) Oct 12 14:02:41 localhost kernel: evm: security.SMACK64TRANSMUTE (disabled) Oct 12 14:02:41 localhost kernel: evm: security.SMACK64MMAP (disabled) Oct 12 14:02:41 localhost kernel: evm: security.apparmor (disabled) Oct 12 14:02:41 localhost kernel: evm: security.ima Oct 12 14:02:41 localhost kernel: evm: security.capability Oct 12 14:02:41 localhost kernel: evm: HMAC attrs: 0x1 Oct 12 14:02:41 localhost kernel: usb 1-1: new full-speed USB device number 2 using uhci_hcd Oct 12 14:02:41 localhost kernel: Running certificate verification RSA selftest Oct 12 14:02:41 localhost kernel: Loaded X.509 cert 'Certificate verification self-testing key: f58703bb33ce1b73ee02eccdee5b8817518fe3db' Oct 12 14:02:41 localhost kernel: Running certificate verification ECDSA selftest Oct 12 14:02:41 localhost kernel: Loaded X.509 cert 'Certificate verification ECDSA self-testing key: 2900bcea1deb7bc8479a84a23d758efdfdd2b2d3' Oct 12 14:02:41 localhost kernel: usb 1-1: New USB device found, idVendor=0627, idProduct=0001, bcdDevice= 0.00 Oct 12 14:02:41 localhost kernel: usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=10 Oct 12 14:02:41 localhost kernel: usb 1-1: Product: QEMU USB Tablet Oct 12 14:02:41 localhost kernel: usb 1-1: Manufacturer: QEMU Oct 12 14:02:41 localhost kernel: usb 1-1: SerialNumber: 28754-0000:00:01.2-1 Oct 12 14:02:41 localhost kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:01.2/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input5 Oct 12 14:02:41 localhost kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:00:01.2-1/input0 Oct 12 14:02:41 localhost kernel: clk: Disabling unused clocks Oct 12 14:02:41 localhost kernel: Freeing unused decrypted memory: 2028K Oct 12 14:02:41 localhost kernel: Freeing unused kernel image (initmem) memory: 4188K Oct 12 14:02:41 localhost kernel: Write protecting the kernel read-only data: 30720k Oct 12 14:02:41 localhost kernel: Freeing unused kernel image (rodata/data gap) memory: 472K Oct 12 14:02:41 localhost kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Oct 12 14:02:41 localhost kernel: Run /init as init process Oct 12 14:02:41 localhost kernel: with arguments: Oct 12 14:02:41 localhost kernel: /init Oct 12 14:02:41 localhost kernel: with environment: Oct 12 14:02:41 localhost kernel: HOME=/ Oct 12 14:02:41 localhost kernel: TERM=linux Oct 12 14:02:41 localhost kernel: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-621.el9.x86_64 Oct 12 14:02:41 localhost systemd[1]: systemd 252-57.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 12 14:02:41 localhost systemd[1]: Detected virtualization kvm. Oct 12 14:02:41 localhost systemd[1]: Detected architecture x86-64. Oct 12 14:02:41 localhost systemd[1]: Running in initrd. Oct 12 14:02:41 localhost systemd[1]: No hostname configured, using default hostname. Oct 12 14:02:41 localhost systemd[1]: Hostname set to . Oct 12 14:02:41 localhost systemd[1]: Initializing machine ID from VM UUID. Oct 12 14:02:41 localhost systemd[1]: Queued start job for default target Initrd Default Target. Oct 12 14:02:41 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Oct 12 14:02:41 localhost systemd[1]: Reached target Local Encrypted Volumes. Oct 12 14:02:41 localhost systemd[1]: Reached target Initrd /usr File System. Oct 12 14:02:41 localhost systemd[1]: Reached target Local File Systems. Oct 12 14:02:41 localhost systemd[1]: Reached target Path Units. Oct 12 14:02:41 localhost systemd[1]: Reached target Slice Units. Oct 12 14:02:41 localhost systemd[1]: Reached target Swaps. Oct 12 14:02:41 localhost systemd[1]: Reached target Timer Units. Oct 12 14:02:41 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Oct 12 14:02:41 localhost systemd[1]: Listening on Journal Socket (/dev/log). Oct 12 14:02:41 localhost systemd[1]: Listening on Journal Socket. Oct 12 14:02:41 localhost systemd[1]: Listening on udev Control Socket. Oct 12 14:02:41 localhost systemd[1]: Listening on udev Kernel Socket. Oct 12 14:02:41 localhost systemd[1]: Reached target Socket Units. Oct 12 14:02:41 localhost systemd[1]: Starting Create List of Static Device Nodes... Oct 12 14:02:41 localhost systemd[1]: Starting Journal Service... Oct 12 14:02:41 localhost systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. Oct 12 14:02:41 localhost systemd[1]: Starting Apply Kernel Variables... Oct 12 14:02:41 localhost systemd[1]: Starting Create System Users... Oct 12 14:02:41 localhost systemd[1]: Starting Setup Virtual Console... Oct 12 14:02:41 localhost systemd[1]: Finished Create List of Static Device Nodes. Oct 12 14:02:41 localhost systemd[1]: Finished Apply Kernel Variables. Oct 12 14:02:41 localhost systemd[1]: Finished Create System Users. Oct 12 14:02:41 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Oct 12 14:02:41 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Oct 12 14:02:41 localhost systemd-journald[303]: Journal started Oct 12 14:02:41 localhost systemd-journald[303]: Runtime Journal (/run/log/journal/805221971a1d4e419d420178d5535f63) is 8.0M, max 153.6M, 145.6M free. Oct 12 14:02:41 localhost systemd-sysusers[308]: Creating group 'users' with GID 100. Oct 12 14:02:41 localhost systemd-sysusers[308]: Creating group 'dbus' with GID 81. Oct 12 14:02:41 localhost systemd-sysusers[308]: Creating user 'dbus' (System Message Bus) with UID 81 and GID 81. Oct 12 14:02:41 localhost systemd[1]: Started Journal Service. Oct 12 14:02:41 localhost systemd[1]: Starting Create Volatile Files and Directories... Oct 12 14:02:41 localhost systemd[1]: Finished Create Volatile Files and Directories. Oct 12 14:02:41 localhost systemd[1]: Finished Setup Virtual Console. Oct 12 14:02:41 localhost systemd[1]: dracut ask for additional cmdline parameters was skipped because no trigger condition checks were met. Oct 12 14:02:41 localhost systemd[1]: Starting dracut cmdline hook... Oct 12 14:02:41 localhost dracut-cmdline[324]: dracut-9 dracut-057-102.git20250818.el9 Oct 12 14:02:41 localhost dracut-cmdline[324]: Using kernel command line parameters: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-621.el9.x86_64 root=UUID=9839e2e1-98a2-4594-b609-79d514deb0a3 ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Oct 12 14:02:41 localhost systemd[1]: Finished dracut cmdline hook. Oct 12 14:02:41 localhost systemd[1]: Starting dracut pre-udev hook... Oct 12 14:02:41 localhost kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 12 14:02:41 localhost kernel: device-mapper: uevent: version 1.0.3 Oct 12 14:02:41 localhost kernel: device-mapper: ioctl: 4.50.0-ioctl (2025-04-28) initialised: dm-devel@lists.linux.dev Oct 12 14:02:41 localhost kernel: RPC: Registered named UNIX socket transport module. Oct 12 14:02:41 localhost kernel: RPC: Registered udp transport module. Oct 12 14:02:41 localhost kernel: RPC: Registered tcp transport module. Oct 12 14:02:41 localhost kernel: RPC: Registered tcp-with-tls transport module. Oct 12 14:02:41 localhost kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Oct 12 14:02:42 localhost rpc.statd[439]: Version 2.5.4 starting Oct 12 14:02:42 localhost rpc.statd[439]: Initializing NSM state Oct 12 14:02:42 localhost rpc.idmapd[444]: Setting log level to 0 Oct 12 14:02:42 localhost systemd[1]: Finished dracut pre-udev hook. Oct 12 14:02:42 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Oct 12 14:02:42 localhost systemd-udevd[457]: Using default interface naming scheme 'rhel-9.0'. Oct 12 14:02:42 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Oct 12 14:02:42 localhost systemd[1]: Starting dracut pre-trigger hook... Oct 12 14:02:42 localhost systemd[1]: Finished dracut pre-trigger hook. Oct 12 14:02:42 localhost systemd[1]: Starting Coldplug All udev Devices... Oct 12 14:02:42 localhost systemd[1]: Created slice Slice /system/modprobe. Oct 12 14:02:42 localhost systemd[1]: Starting Load Kernel Module configfs... Oct 12 14:02:42 localhost systemd[1]: Finished Coldplug All udev Devices. Oct 12 14:02:42 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 12 14:02:42 localhost systemd[1]: Finished Load Kernel Module configfs. Oct 12 14:02:42 localhost systemd[1]: Mounting Kernel Configuration File System... Oct 12 14:02:42 localhost systemd[1]: nm-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Oct 12 14:02:42 localhost systemd[1]: Reached target Network. Oct 12 14:02:42 localhost systemd[1]: nm-wait-online-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Oct 12 14:02:42 localhost systemd[1]: Starting dracut initqueue hook... Oct 12 14:02:42 localhost systemd[1]: Mounted Kernel Configuration File System. Oct 12 14:02:42 localhost systemd[1]: Reached target System Initialization. Oct 12 14:02:42 localhost systemd[1]: Reached target Basic System. Oct 12 14:02:42 localhost kernel: virtio_blk virtio2: 8/0/0 default/read/poll queues Oct 12 14:02:42 localhost kernel: virtio_blk virtio2: [vda] 83886080 512-byte logical blocks (42.9 GB/40.0 GiB) Oct 12 14:02:42 localhost kernel: vda: vda1 Oct 12 14:02:42 localhost kernel: libata version 3.00 loaded. Oct 12 14:02:42 localhost kernel: ata_piix 0000:00:01.1: version 2.13 Oct 12 14:02:42 localhost kernel: scsi host0: ata_piix Oct 12 14:02:42 localhost kernel: scsi host1: ata_piix Oct 12 14:02:42 localhost kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc140 irq 14 lpm-pol 0 Oct 12 14:02:42 localhost kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc148 irq 15 lpm-pol 0 Oct 12 14:02:42 localhost systemd[1]: Found device /dev/disk/by-uuid/9839e2e1-98a2-4594-b609-79d514deb0a3. Oct 12 14:02:42 localhost systemd[1]: Reached target Initrd Root Device. Oct 12 14:02:42 localhost kernel: ata1: found unknown device (class 0) Oct 12 14:02:42 localhost kernel: ata1.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Oct 12 14:02:42 localhost kernel: scsi 0:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Oct 12 14:02:42 localhost systemd-udevd[468]: Network interface NamePolicy= disabled on kernel command line. Oct 12 14:02:42 localhost kernel: scsi 0:0:0:0: Attached scsi generic sg0 type 5 Oct 12 14:02:42 localhost kernel: sr 0:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Oct 12 14:02:42 localhost kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Oct 12 14:02:42 localhost kernel: sr 0:0:0:0: Attached scsi CD-ROM sr0 Oct 12 14:02:42 localhost systemd[1]: Finished dracut initqueue hook. Oct 12 14:02:42 localhost systemd[1]: Reached target Preparation for Remote File Systems. Oct 12 14:02:42 localhost systemd[1]: Reached target Remote Encrypted Volumes. Oct 12 14:02:42 localhost systemd[1]: Reached target Remote File Systems. Oct 12 14:02:42 localhost systemd[1]: Starting dracut pre-mount hook... Oct 12 14:02:42 localhost systemd[1]: Finished dracut pre-mount hook. Oct 12 14:02:42 localhost systemd[1]: Starting File System Check on /dev/disk/by-uuid/9839e2e1-98a2-4594-b609-79d514deb0a3... Oct 12 14:02:42 localhost systemd-fsck[552]: /usr/sbin/fsck.xfs: XFS file system. Oct 12 14:02:42 localhost systemd[1]: Finished File System Check on /dev/disk/by-uuid/9839e2e1-98a2-4594-b609-79d514deb0a3. Oct 12 14:02:42 localhost systemd[1]: Mounting /sysroot... Oct 12 14:02:43 localhost kernel: SGI XFS with ACLs, security attributes, scrub, quota, no debug enabled Oct 12 14:02:43 localhost kernel: XFS (vda1): Mounting V5 Filesystem 9839e2e1-98a2-4594-b609-79d514deb0a3 Oct 12 14:02:43 localhost kernel: XFS (vda1): Ending clean mount Oct 12 14:02:43 localhost systemd[1]: Mounted /sysroot. Oct 12 14:02:43 localhost systemd[1]: Reached target Initrd Root File System. Oct 12 14:02:43 localhost systemd[1]: Starting Mountpoints Configured in the Real Root... Oct 12 14:02:43 localhost systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 12 14:02:43 localhost systemd[1]: Finished Mountpoints Configured in the Real Root. Oct 12 14:02:43 localhost systemd[1]: Reached target Initrd File Systems. Oct 12 14:02:43 localhost systemd[1]: Reached target Initrd Default Target. Oct 12 14:02:43 localhost systemd[1]: Starting dracut mount hook... Oct 12 14:02:43 localhost systemd[1]: Finished dracut mount hook. Oct 12 14:02:43 localhost systemd[1]: Starting dracut pre-pivot and cleanup hook... Oct 12 14:02:43 localhost rpc.idmapd[444]: exiting on signal 15 Oct 12 14:02:43 localhost systemd[1]: var-lib-nfs-rpc_pipefs.mount: Deactivated successfully. Oct 12 14:02:43 localhost systemd[1]: Finished dracut pre-pivot and cleanup hook. Oct 12 14:02:43 localhost systemd[1]: Starting Cleaning Up and Shutting Down Daemons... Oct 12 14:02:43 localhost systemd[1]: Stopped target Network. Oct 12 14:02:43 localhost systemd[1]: Stopped target Remote Encrypted Volumes. Oct 12 14:02:43 localhost systemd[1]: Stopped target Timer Units. Oct 12 14:02:43 localhost systemd[1]: dbus.socket: Deactivated successfully. Oct 12 14:02:43 localhost systemd[1]: Closed D-Bus System Message Bus Socket. Oct 12 14:02:43 localhost systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 12 14:02:43 localhost systemd[1]: Stopped dracut pre-pivot and cleanup hook. Oct 12 14:02:43 localhost systemd[1]: Stopped target Initrd Default Target. Oct 12 14:02:43 localhost systemd[1]: Stopped target Basic System. Oct 12 14:02:43 localhost systemd[1]: Stopped target Initrd Root Device. Oct 12 14:02:43 localhost systemd[1]: Stopped target Initrd /usr File System. Oct 12 14:02:43 localhost systemd[1]: Stopped target Path Units. Oct 12 14:02:43 localhost systemd[1]: Stopped target Remote File Systems. Oct 12 14:02:43 localhost systemd[1]: Stopped target Preparation for Remote File Systems. Oct 12 14:02:43 localhost systemd[1]: Stopped target Slice Units. Oct 12 14:02:43 localhost systemd[1]: Stopped target Socket Units. Oct 12 14:02:43 localhost systemd[1]: Stopped target System Initialization. Oct 12 14:02:43 localhost systemd[1]: Stopped target Local File Systems. Oct 12 14:02:43 localhost systemd[1]: Stopped target Swaps. Oct 12 14:02:43 localhost systemd[1]: dracut-mount.service: Deactivated successfully. Oct 12 14:02:43 localhost systemd[1]: Stopped dracut mount hook. Oct 12 14:02:43 localhost systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 12 14:02:43 localhost systemd[1]: Stopped dracut pre-mount hook. Oct 12 14:02:43 localhost systemd[1]: Stopped target Local Encrypted Volumes. Oct 12 14:02:43 localhost systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 12 14:02:43 localhost systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch. Oct 12 14:02:43 localhost systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 12 14:02:43 localhost systemd[1]: Stopped dracut initqueue hook. Oct 12 14:02:43 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 12 14:02:43 localhost systemd[1]: Stopped Apply Kernel Variables. Oct 12 14:02:43 localhost systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Oct 12 14:02:43 localhost systemd[1]: Stopped Create Volatile Files and Directories. Oct 12 14:02:43 localhost systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 12 14:02:43 localhost systemd[1]: Stopped Coldplug All udev Devices. Oct 12 14:02:43 localhost systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 12 14:02:43 localhost systemd[1]: Stopped dracut pre-trigger hook. Oct 12 14:02:43 localhost systemd[1]: Stopping Rule-based Manager for Device Events and Files... Oct 12 14:02:43 localhost systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 12 14:02:43 localhost systemd[1]: Stopped Setup Virtual Console. Oct 12 14:02:43 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup.service.mount: Deactivated successfully. Oct 12 14:02:43 localhost systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 12 14:02:43 localhost systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 12 14:02:43 localhost systemd[1]: Finished Cleaning Up and Shutting Down Daemons. Oct 12 14:02:43 localhost systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 12 14:02:43 localhost systemd[1]: Stopped Rule-based Manager for Device Events and Files. Oct 12 14:02:43 localhost systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 12 14:02:43 localhost systemd[1]: Closed udev Control Socket. Oct 12 14:02:43 localhost systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 12 14:02:43 localhost systemd[1]: Closed udev Kernel Socket. Oct 12 14:02:43 localhost systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 12 14:02:43 localhost systemd[1]: Stopped dracut pre-udev hook. Oct 12 14:02:43 localhost systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 12 14:02:43 localhost systemd[1]: Stopped dracut cmdline hook. Oct 12 14:02:43 localhost systemd[1]: Starting Cleanup udev Database... Oct 12 14:02:43 localhost systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Oct 12 14:02:43 localhost systemd[1]: Stopped Create Static Device Nodes in /dev. Oct 12 14:02:43 localhost systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 12 14:02:43 localhost systemd[1]: Stopped Create List of Static Device Nodes. Oct 12 14:02:43 localhost systemd[1]: systemd-sysusers.service: Deactivated successfully. Oct 12 14:02:43 localhost systemd[1]: Stopped Create System Users. Oct 12 14:02:43 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Oct 12 14:02:43 localhost systemd[1]: run-credentials-systemd\x2dsysusers.service.mount: Deactivated successfully. Oct 12 14:02:43 localhost systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 12 14:02:43 localhost systemd[1]: Finished Cleanup udev Database. Oct 12 14:02:43 localhost systemd[1]: Reached target Switch Root. Oct 12 14:02:43 localhost systemd[1]: Starting Switch Root... Oct 12 14:02:43 localhost systemd[1]: Switching root. Oct 12 14:02:43 localhost systemd-journald[303]: Received SIGTERM from PID 1 (systemd). Oct 12 14:02:43 localhost systemd-journald[303]: Journal stopped Oct 12 14:02:44 localhost kernel: audit: type=1404 audit(1760292164.015:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 Oct 12 14:02:44 localhost kernel: SELinux: policy capability network_peer_controls=1 Oct 12 14:02:44 localhost kernel: SELinux: policy capability open_perms=1 Oct 12 14:02:44 localhost kernel: SELinux: policy capability extended_socket_class=1 Oct 12 14:02:44 localhost kernel: SELinux: policy capability always_check_network=0 Oct 12 14:02:44 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Oct 12 14:02:44 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 12 14:02:44 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 12 14:02:44 localhost kernel: audit: type=1403 audit(1760292164.184:3): auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 12 14:02:44 localhost systemd[1]: Successfully loaded SELinux policy in 173.296ms. Oct 12 14:02:44 localhost systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 28.544ms. Oct 12 14:02:44 localhost systemd[1]: systemd 252-57.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 12 14:02:44 localhost systemd[1]: Detected virtualization kvm. Oct 12 14:02:44 localhost systemd[1]: Detected architecture x86-64. Oct 12 14:02:44 localhost systemd-rc-local-generator[636]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:02:44 localhost systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 12 14:02:44 localhost systemd[1]: Stopped Switch Root. Oct 12 14:02:44 localhost systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 12 14:02:44 localhost systemd[1]: Created slice Slice /system/getty. Oct 12 14:02:44 localhost systemd[1]: Created slice Slice /system/serial-getty. Oct 12 14:02:44 localhost systemd[1]: Created slice Slice /system/sshd-keygen. Oct 12 14:02:44 localhost systemd[1]: Created slice User and Session Slice. Oct 12 14:02:44 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Oct 12 14:02:44 localhost systemd[1]: Started Forward Password Requests to Wall Directory Watch. Oct 12 14:02:44 localhost systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. Oct 12 14:02:44 localhost systemd[1]: Reached target Local Encrypted Volumes. Oct 12 14:02:44 localhost systemd[1]: Stopped target Switch Root. Oct 12 14:02:44 localhost systemd[1]: Stopped target Initrd File Systems. Oct 12 14:02:44 localhost systemd[1]: Stopped target Initrd Root File System. Oct 12 14:02:44 localhost systemd[1]: Reached target Local Integrity Protected Volumes. Oct 12 14:02:44 localhost systemd[1]: Reached target Path Units. Oct 12 14:02:44 localhost systemd[1]: Reached target rpc_pipefs.target. Oct 12 14:02:44 localhost systemd[1]: Reached target Slice Units. Oct 12 14:02:44 localhost systemd[1]: Reached target Swaps. Oct 12 14:02:44 localhost systemd[1]: Reached target Local Verity Protected Volumes. Oct 12 14:02:44 localhost systemd[1]: Listening on RPCbind Server Activation Socket. Oct 12 14:02:44 localhost systemd[1]: Reached target RPC Port Mapper. Oct 12 14:02:44 localhost systemd[1]: Listening on Process Core Dump Socket. Oct 12 14:02:44 localhost systemd[1]: Listening on initctl Compatibility Named Pipe. Oct 12 14:02:44 localhost systemd[1]: Listening on udev Control Socket. Oct 12 14:02:44 localhost systemd[1]: Listening on udev Kernel Socket. Oct 12 14:02:44 localhost systemd[1]: Mounting Huge Pages File System... Oct 12 14:02:44 localhost systemd[1]: Mounting POSIX Message Queue File System... Oct 12 14:02:44 localhost systemd[1]: Mounting Kernel Debug File System... Oct 12 14:02:44 localhost systemd[1]: Mounting Kernel Trace File System... Oct 12 14:02:44 localhost systemd[1]: Kernel Module supporting RPCSEC_GSS was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Oct 12 14:02:44 localhost systemd[1]: Starting Create List of Static Device Nodes... Oct 12 14:02:44 localhost systemd[1]: Starting Load Kernel Module configfs... Oct 12 14:02:44 localhost systemd[1]: Starting Load Kernel Module drm... Oct 12 14:02:44 localhost systemd[1]: Starting Load Kernel Module efi_pstore... Oct 12 14:02:44 localhost systemd[1]: Starting Load Kernel Module fuse... Oct 12 14:02:44 localhost systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Oct 12 14:02:44 localhost systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 12 14:02:44 localhost systemd[1]: Stopped File System Check on Root Device. Oct 12 14:02:44 localhost systemd[1]: Stopped Journal Service. Oct 12 14:02:44 localhost systemd[1]: Starting Journal Service... Oct 12 14:02:44 localhost systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. Oct 12 14:02:44 localhost systemd[1]: Starting Generate network units from Kernel command line... Oct 12 14:02:44 localhost systemd[1]: TPM2 PCR Machine ID Measurement was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 12 14:02:44 localhost systemd[1]: Starting Remount Root and Kernel File Systems... Oct 12 14:02:44 localhost systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met. Oct 12 14:02:44 localhost kernel: fuse: init (API version 7.37) Oct 12 14:02:44 localhost systemd[1]: Starting Apply Kernel Variables... Oct 12 14:02:44 localhost systemd[1]: Starting Coldplug All udev Devices... Oct 12 14:02:44 localhost kernel: xfs filesystem being remounted at / supports timestamps until 2038 (0x7fffffff) Oct 12 14:02:44 localhost systemd[1]: Mounted Huge Pages File System. Oct 12 14:02:44 localhost systemd[1]: Mounted POSIX Message Queue File System. Oct 12 14:02:44 localhost systemd[1]: Mounted Kernel Debug File System. Oct 12 14:02:44 localhost systemd[1]: Mounted Kernel Trace File System. Oct 12 14:02:44 localhost systemd[1]: Finished Create List of Static Device Nodes. Oct 12 14:02:44 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 12 14:02:44 localhost systemd[1]: Finished Load Kernel Module configfs. Oct 12 14:02:44 localhost systemd-journald[677]: Journal started Oct 12 14:02:44 localhost systemd-journald[677]: Runtime Journal (/run/log/journal/a1727ec20198bc6caf436a6e13c4ff5e) is 8.0M, max 153.6M, 145.6M free. Oct 12 14:02:44 localhost systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 12 14:02:44 localhost systemd[1]: Queued start job for default target Multi-User System. Oct 12 14:02:44 localhost systemd[1]: systemd-journald.service: Deactivated successfully. Oct 12 14:02:44 localhost systemd[1]: Finished Load Kernel Module efi_pstore. Oct 12 14:02:44 localhost kernel: ACPI: bus type drm_connector registered Oct 12 14:02:44 localhost systemd[1]: Started Journal Service. Oct 12 14:02:44 localhost systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 12 14:02:44 localhost systemd[1]: Finished Load Kernel Module drm. Oct 12 14:02:44 localhost systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 12 14:02:44 localhost systemd[1]: Finished Load Kernel Module fuse. Oct 12 14:02:44 localhost systemd[1]: Finished Read and set NIS domainname from /etc/sysconfig/network. Oct 12 14:02:44 localhost systemd[1]: Finished Generate network units from Kernel command line. Oct 12 14:02:44 localhost systemd[1]: Finished Remount Root and Kernel File Systems. Oct 12 14:02:44 localhost systemd[1]: Finished Apply Kernel Variables. Oct 12 14:02:44 localhost systemd[1]: Mounting FUSE Control File System... Oct 12 14:02:44 localhost systemd[1]: First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Oct 12 14:02:44 localhost systemd[1]: Starting Rebuild Hardware Database... Oct 12 14:02:44 localhost systemd[1]: Starting Flush Journal to Persistent Storage... Oct 12 14:02:44 localhost systemd[1]: Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 12 14:02:44 localhost systemd[1]: Starting Load/Save OS Random Seed... Oct 12 14:02:44 localhost systemd[1]: Starting Create System Users... Oct 12 14:02:44 localhost systemd[1]: Mounted FUSE Control File System. Oct 12 14:02:44 localhost systemd-journald[677]: Runtime Journal (/run/log/journal/a1727ec20198bc6caf436a6e13c4ff5e) is 8.0M, max 153.6M, 145.6M free. Oct 12 14:02:44 localhost systemd-journald[677]: Received client request to flush runtime journal. Oct 12 14:02:44 localhost systemd[1]: Finished Flush Journal to Persistent Storage. Oct 12 14:02:44 localhost systemd[1]: Finished Load/Save OS Random Seed. Oct 12 14:02:44 localhost systemd[1]: First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Oct 12 14:02:44 localhost systemd[1]: Finished Coldplug All udev Devices. Oct 12 14:02:44 localhost systemd[1]: Finished Create System Users. Oct 12 14:02:44 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Oct 12 14:02:45 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Oct 12 14:02:45 localhost systemd[1]: Reached target Preparation for Local File Systems. Oct 12 14:02:45 localhost systemd[1]: Reached target Local File Systems. Oct 12 14:02:45 localhost systemd[1]: Starting Rebuild Dynamic Linker Cache... Oct 12 14:02:45 localhost systemd[1]: Mark the need to relabel after reboot was skipped because of an unmet condition check (ConditionSecurity=!selinux). Oct 12 14:02:45 localhost systemd[1]: Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Oct 12 14:02:45 localhost systemd[1]: Update Boot Loader Random Seed was skipped because no trigger condition checks were met. Oct 12 14:02:45 localhost systemd[1]: Starting Automatic Boot Loader Update... Oct 12 14:02:45 localhost systemd[1]: Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Oct 12 14:02:45 localhost systemd[1]: Starting Create Volatile Files and Directories... Oct 12 14:02:45 localhost bootctl[695]: Couldn't find EFI system partition, skipping. Oct 12 14:02:45 localhost systemd[1]: Finished Automatic Boot Loader Update. Oct 12 14:02:45 localhost systemd[1]: Finished Create Volatile Files and Directories. Oct 12 14:02:45 localhost systemd[1]: Starting Security Auditing Service... Oct 12 14:02:45 localhost systemd[1]: Starting RPC Bind... Oct 12 14:02:45 localhost systemd[1]: Starting Rebuild Journal Catalog... Oct 12 14:02:45 localhost auditd[702]: audit dispatcher initialized with q_depth=2000 and 1 active plugins Oct 12 14:02:45 localhost auditd[702]: Init complete, auditd 3.1.5 listening for events (startup state enable) Oct 12 14:02:45 localhost systemd[1]: Started RPC Bind. Oct 12 14:02:45 localhost systemd[1]: Finished Rebuild Journal Catalog. Oct 12 14:02:45 localhost augenrules[707]: /sbin/augenrules: No change Oct 12 14:02:45 localhost augenrules[722]: No rules Oct 12 14:02:45 localhost augenrules[722]: enabled 1 Oct 12 14:02:45 localhost augenrules[722]: failure 1 Oct 12 14:02:45 localhost augenrules[722]: pid 702 Oct 12 14:02:45 localhost augenrules[722]: rate_limit 0 Oct 12 14:02:45 localhost augenrules[722]: backlog_limit 8192 Oct 12 14:02:45 localhost augenrules[722]: lost 0 Oct 12 14:02:45 localhost augenrules[722]: backlog 3 Oct 12 14:02:45 localhost augenrules[722]: backlog_wait_time 60000 Oct 12 14:02:45 localhost augenrules[722]: backlog_wait_time_actual 0 Oct 12 14:02:45 localhost augenrules[722]: enabled 1 Oct 12 14:02:45 localhost augenrules[722]: failure 1 Oct 12 14:02:45 localhost augenrules[722]: pid 702 Oct 12 14:02:45 localhost augenrules[722]: rate_limit 0 Oct 12 14:02:45 localhost augenrules[722]: backlog_limit 8192 Oct 12 14:02:45 localhost augenrules[722]: lost 0 Oct 12 14:02:45 localhost augenrules[722]: backlog 1 Oct 12 14:02:45 localhost augenrules[722]: backlog_wait_time 60000 Oct 12 14:02:45 localhost augenrules[722]: backlog_wait_time_actual 0 Oct 12 14:02:45 localhost augenrules[722]: enabled 1 Oct 12 14:02:45 localhost augenrules[722]: failure 1 Oct 12 14:02:45 localhost augenrules[722]: pid 702 Oct 12 14:02:45 localhost augenrules[722]: rate_limit 0 Oct 12 14:02:45 localhost augenrules[722]: backlog_limit 8192 Oct 12 14:02:45 localhost augenrules[722]: lost 0 Oct 12 14:02:45 localhost augenrules[722]: backlog 3 Oct 12 14:02:45 localhost augenrules[722]: backlog_wait_time 60000 Oct 12 14:02:45 localhost augenrules[722]: backlog_wait_time_actual 0 Oct 12 14:02:45 localhost systemd[1]: Started Security Auditing Service. Oct 12 14:02:45 localhost systemd[1]: Starting Record System Boot/Shutdown in UTMP... Oct 12 14:02:45 localhost systemd[1]: Finished Record System Boot/Shutdown in UTMP. Oct 12 14:02:45 localhost systemd[1]: Finished Rebuild Hardware Database. Oct 12 14:02:45 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Oct 12 14:02:45 localhost systemd[1]: Finished Rebuild Dynamic Linker Cache. Oct 12 14:02:45 localhost systemd[1]: Starting Update is Completed... Oct 12 14:02:45 localhost systemd[1]: Finished Update is Completed. Oct 12 14:02:45 localhost systemd-udevd[730]: Using default interface naming scheme 'rhel-9.0'. Oct 12 14:02:45 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Oct 12 14:02:45 localhost systemd[1]: Reached target System Initialization. Oct 12 14:02:45 localhost systemd[1]: Started dnf makecache --timer. Oct 12 14:02:45 localhost systemd[1]: Started Daily rotation of log files. Oct 12 14:02:45 localhost systemd[1]: Started Daily Cleanup of Temporary Directories. Oct 12 14:02:45 localhost systemd[1]: Reached target Timer Units. Oct 12 14:02:45 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Oct 12 14:02:45 localhost systemd[1]: Listening on SSSD Kerberos Cache Manager responder socket. Oct 12 14:02:45 localhost systemd[1]: Reached target Socket Units. Oct 12 14:02:45 localhost systemd[1]: Starting D-Bus System Message Bus... Oct 12 14:02:45 localhost systemd[1]: TPM2 PCR Barrier (Initialization) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 12 14:02:45 localhost systemd[1]: Condition check resulted in /dev/ttyS0 being skipped. Oct 12 14:02:45 localhost systemd-udevd[738]: Network interface NamePolicy= disabled on kernel command line. Oct 12 14:02:45 localhost systemd[1]: Starting Load Kernel Module configfs... Oct 12 14:02:45 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 12 14:02:45 localhost systemd[1]: Finished Load Kernel Module configfs. Oct 12 14:02:45 localhost kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Oct 12 14:02:45 localhost kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Oct 12 14:02:45 localhost kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Oct 12 14:02:45 localhost systemd[1]: Started D-Bus System Message Bus. Oct 12 14:02:45 localhost systemd[1]: Reached target Basic System. Oct 12 14:02:45 localhost dbus-broker-lau[765]: Ready Oct 12 14:02:45 localhost systemd[1]: Starting NTP client/server... Oct 12 14:02:45 localhost systemd[1]: Starting Cloud-init: Local Stage (pre-network)... Oct 12 14:02:45 localhost systemd[1]: Starting Restore /run/initramfs on shutdown... Oct 12 14:02:45 localhost systemd[1]: Starting IPv4 firewall with iptables... Oct 12 14:02:45 localhost systemd[1]: Started irqbalance daemon. Oct 12 14:02:45 localhost systemd[1]: Load CPU microcode update was skipped because of an unmet condition check (ConditionPathExists=/sys/devices/system/cpu/microcode/reload). Oct 12 14:02:45 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 12 14:02:45 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 12 14:02:45 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 12 14:02:45 localhost systemd[1]: Reached target sshd-keygen.target. Oct 12 14:02:45 localhost systemd[1]: System Security Services Daemon was skipped because no trigger condition checks were met. Oct 12 14:02:45 localhost systemd[1]: Reached target User and Group Name Lookups. Oct 12 14:02:45 localhost kernel: input: PC Speaker as /devices/platform/pcspkr/input/input6 Oct 12 14:02:45 localhost chronyd[795]: chronyd version 4.6.1 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +NTS +SECHASH +IPV6 +DEBUG) Oct 12 14:02:45 localhost chronyd[795]: Loaded 0 symmetric keys Oct 12 14:02:45 localhost chronyd[795]: Using right/UTC timezone to obtain leap second data Oct 12 14:02:45 localhost chronyd[795]: Loaded seccomp filter (level 2) Oct 12 14:02:45 localhost systemd[1]: Starting User Login Management... Oct 12 14:02:45 localhost systemd[1]: Started NTP client/server. Oct 12 14:02:45 localhost systemd[1]: Finished Restore /run/initramfs on shutdown. Oct 12 14:02:45 localhost systemd-logind[791]: Watching system buttons on /dev/input/event0 (Power Button) Oct 12 14:02:45 localhost systemd-logind[791]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Oct 12 14:02:45 localhost systemd-logind[791]: New seat seat0. Oct 12 14:02:45 localhost systemd[1]: Started User Login Management. Oct 12 14:02:45 localhost kernel: kvm_amd: TSC scaling supported Oct 12 14:02:45 localhost kernel: kvm_amd: Nested Virtualization enabled Oct 12 14:02:45 localhost kernel: kvm_amd: Nested Paging enabled Oct 12 14:02:45 localhost kernel: kvm_amd: LBR virtualization supported Oct 12 14:02:45 localhost kernel: [drm] pci: virtio-vga detected at 0000:00:02.0 Oct 12 14:02:45 localhost kernel: virtio-pci 0000:00:02.0: vgaarb: deactivate vga console Oct 12 14:02:45 localhost kernel: Console: switching to colour dummy device 80x25 Oct 12 14:02:45 localhost kernel: [drm] features: -virgl +edid -resource_blob -host_visible Oct 12 14:02:45 localhost kernel: [drm] features: -context_init Oct 12 14:02:45 localhost kernel: [drm] number of scanouts: 1 Oct 12 14:02:45 localhost kernel: [drm] number of cap sets: 0 Oct 12 14:02:45 localhost kernel: [drm] Initialized virtio_gpu 0.1.0 for 0000:00:02.0 on minor 0 Oct 12 14:02:45 localhost kernel: fbcon: virtio_gpudrmfb (fb0) is primary device Oct 12 14:02:45 localhost kernel: Console: switching to colour frame buffer device 128x48 Oct 12 14:02:45 localhost kernel: virtio-pci 0000:00:02.0: [drm] fb0: virtio_gpudrmfb frame buffer device Oct 12 14:02:45 localhost kernel: Warning: Deprecated Driver is detected: nft_compat will not be maintained in a future major release and may be disabled Oct 12 14:02:45 localhost kernel: Warning: Deprecated Driver is detected: nft_compat_module_init will not be maintained in a future major release and may be disabled Oct 12 14:02:46 localhost iptables.init[782]: iptables: Applying firewall rules: [ OK ] Oct 12 14:02:46 localhost systemd[1]: Finished IPv4 firewall with iptables. Oct 12 14:02:46 localhost cloud-init[839]: Cloud-init v. 24.4-7.el9 running 'init-local' at Sun, 12 Oct 2025 18:02:46 +0000. Up 7.13 seconds. Oct 12 14:02:46 localhost kernel: ISO 9660 Extensions: Microsoft Joliet Level 3 Oct 12 14:02:46 localhost kernel: ISO 9660 Extensions: RRIP_1991A Oct 12 14:02:46 localhost systemd[1]: run-cloud\x2dinit-tmp-tmpele9pq0g.mount: Deactivated successfully. Oct 12 14:02:46 localhost systemd[1]: Starting Hostname Service... Oct 12 14:02:46 localhost systemd[1]: Started Hostname Service. Oct 12 14:02:46 np0005481648.novalocal systemd-hostnamed[853]: Hostname set to (static) Oct 12 14:02:46 np0005481648.novalocal systemd[1]: Finished Cloud-init: Local Stage (pre-network). Oct 12 14:02:46 np0005481648.novalocal systemd[1]: Reached target Preparation for Network. Oct 12 14:02:46 np0005481648.novalocal systemd[1]: Starting Network Manager... Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.0493] NetworkManager (version 1.54.1-1.el9) is starting... (boot:a259ffbe-d3cb-4e83-8042-b8ff2711ac84) Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.0496] Read config: /etc/NetworkManager/NetworkManager.conf, /run/NetworkManager/conf.d/15-carrier-timeout.conf Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.0655] manager[0x55df11c1f080]: monitoring kernel firmware directory '/lib/firmware'. Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.0694] hostname: hostname: using hostnamed Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.0694] hostname: static hostname changed from (none) to "np0005481648.novalocal" Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.0698] dns-mgr: init: dns=default,systemd-resolved rc-manager=symlink (auto) Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.0800] manager[0x55df11c1f080]: rfkill: Wi-Fi hardware radio set enabled Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.0801] manager[0x55df11c1f080]: rfkill: WWAN hardware radio set enabled Oct 12 14:02:47 np0005481648.novalocal systemd[1]: Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.0914] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.54.1-1.el9/libnm-device-plugin-team.so) Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.0914] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.0915] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.0915] manager: Networking is enabled by state file Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.0917] settings: Loaded settings plugin: keyfile (internal) Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.0987] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.54.1-1.el9/libnm-settings-plugin-ifcfg-rh.so") Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.1010] Warning: the ifcfg-rh plugin is deprecated, please migrate connections to the keyfile format using "nmcli connection migrate" Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.1035] dhcp: init: Using DHCP client 'internal' Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.1037] manager: (lo): new Loopback device (/org/freedesktop/NetworkManager/Devices/1) Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.1047] device (lo): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.1061] device (lo): state change: unavailable -> disconnected (reason 'connection-assumed', managed-type: 'external') Oct 12 14:02:47 np0005481648.novalocal systemd[1]: Starting Network Manager Script Dispatcher Service... Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.1080] device (lo): Activation: starting connection 'lo' (7f2c3d62-71b4-4963-88e6-471f7613f36c) Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.1086] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.1088] device (eth0): state change: unmanaged -> unavailable (reason 'managed', managed-type: 'external') Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.1111] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Oct 12 14:02:47 np0005481648.novalocal systemd[1]: Started Network Manager. Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.1127] device (lo): state change: disconnected -> prepare (reason 'none', managed-type: 'external') Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.1130] device (lo): state change: prepare -> config (reason 'none', managed-type: 'external') Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.1131] device (lo): state change: config -> ip-config (reason 'none', managed-type: 'external') Oct 12 14:02:47 np0005481648.novalocal systemd[1]: Reached target Network. Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.1145] device (eth0): carrier: link connected Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.1148] device (lo): state change: ip-config -> ip-check (reason 'none', managed-type: 'external') Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.1154] device (eth0): state change: unavailable -> disconnected (reason 'carrier-changed', managed-type: 'full') Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.1159] policy: auto-activating connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.1165] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.1166] device (eth0): state change: disconnected -> prepare (reason 'none', managed-type: 'full') Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.1167] manager: NetworkManager state is now CONNECTING Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.1168] device (eth0): state change: prepare -> config (reason 'none', managed-type: 'full') Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.1174] device (eth0): state change: config -> ip-config (reason 'none', managed-type: 'full') Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.1176] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Oct 12 14:02:47 np0005481648.novalocal systemd[1]: Starting Network Manager Wait Online... Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.1216] dhcp4 (eth0): state changed new lease, address=38.102.83.23 Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.1222] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS Oct 12 14:02:47 np0005481648.novalocal systemd[1]: Starting GSSAPI Proxy Daemon... Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.1237] device (eth0): state change: ip-config -> ip-check (reason 'none', managed-type: 'full') Oct 12 14:02:47 np0005481648.novalocal systemd[1]: Started Network Manager Script Dispatcher Service. Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.1300] device (lo): state change: ip-check -> secondaries (reason 'none', managed-type: 'external') Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.1302] device (lo): state change: secondaries -> activated (reason 'none', managed-type: 'external') Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.1307] device (lo): Activation: successful, device activated. Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.1313] device (eth0): state change: ip-check -> secondaries (reason 'none', managed-type: 'full') Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.1314] device (eth0): state change: secondaries -> activated (reason 'none', managed-type: 'full') Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.1316] manager: NetworkManager state is now CONNECTED_SITE Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.1319] device (eth0): Activation: successful, device activated. Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.1324] manager: NetworkManager state is now CONNECTED_GLOBAL Oct 12 14:02:47 np0005481648.novalocal NetworkManager[857]: [1760292167.1326] manager: startup complete Oct 12 14:02:47 np0005481648.novalocal systemd[1]: Started GSSAPI Proxy Daemon. Oct 12 14:02:47 np0005481648.novalocal systemd[1]: RPC security service for NFS client and server was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Oct 12 14:02:47 np0005481648.novalocal systemd[1]: Reached target NFS client services. Oct 12 14:02:47 np0005481648.novalocal systemd[1]: Reached target Preparation for Remote File Systems. Oct 12 14:02:47 np0005481648.novalocal systemd[1]: Reached target Remote File Systems. Oct 12 14:02:47 np0005481648.novalocal systemd[1]: TPM2 PCR Barrier (User) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 12 14:02:47 np0005481648.novalocal systemd[1]: Finished Network Manager Wait Online. Oct 12 14:02:47 np0005481648.novalocal systemd[1]: Starting Cloud-init: Network Stage... Oct 12 14:02:47 np0005481648.novalocal cloud-init[921]: Cloud-init v. 24.4-7.el9 running 'init' at Sun, 12 Oct 2025 18:02:47 +0000. Up 8.11 seconds. Oct 12 14:02:47 np0005481648.novalocal cloud-init[921]: ci-info: +++++++++++++++++++++++++++++++++++++++Net device info+++++++++++++++++++++++++++++++++++++++ Oct 12 14:02:47 np0005481648.novalocal cloud-init[921]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Oct 12 14:02:47 np0005481648.novalocal cloud-init[921]: ci-info: | Device | Up | Address | Mask | Scope | Hw-Address | Oct 12 14:02:47 np0005481648.novalocal cloud-init[921]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Oct 12 14:02:47 np0005481648.novalocal cloud-init[921]: ci-info: | eth0 | True | 38.102.83.23 | 255.255.255.0 | global | fa:16:3e:93:a3:c8 | Oct 12 14:02:47 np0005481648.novalocal cloud-init[921]: ci-info: | eth0 | True | fe80::f816:3eff:fe93:a3c8/64 | . | link | fa:16:3e:93:a3:c8 | Oct 12 14:02:47 np0005481648.novalocal cloud-init[921]: ci-info: | lo | True | 127.0.0.1 | 255.0.0.0 | host | . | Oct 12 14:02:47 np0005481648.novalocal cloud-init[921]: ci-info: | lo | True | ::1/128 | . | host | . | Oct 12 14:02:47 np0005481648.novalocal cloud-init[921]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Oct 12 14:02:47 np0005481648.novalocal cloud-init[921]: ci-info: +++++++++++++++++++++++++++++++++Route IPv4 info+++++++++++++++++++++++++++++++++ Oct 12 14:02:47 np0005481648.novalocal cloud-init[921]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Oct 12 14:02:47 np0005481648.novalocal cloud-init[921]: ci-info: | Route | Destination | Gateway | Genmask | Interface | Flags | Oct 12 14:02:47 np0005481648.novalocal cloud-init[921]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Oct 12 14:02:47 np0005481648.novalocal cloud-init[921]: ci-info: | 0 | 0.0.0.0 | 38.102.83.1 | 0.0.0.0 | eth0 | UG | Oct 12 14:02:47 np0005481648.novalocal cloud-init[921]: ci-info: | 1 | 38.102.83.0 | 0.0.0.0 | 255.255.255.0 | eth0 | U | Oct 12 14:02:47 np0005481648.novalocal cloud-init[921]: ci-info: | 2 | 169.254.169.254 | 38.102.83.126 | 255.255.255.255 | eth0 | UGH | Oct 12 14:02:47 np0005481648.novalocal cloud-init[921]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Oct 12 14:02:47 np0005481648.novalocal cloud-init[921]: ci-info: +++++++++++++++++++Route IPv6 info+++++++++++++++++++ Oct 12 14:02:47 np0005481648.novalocal cloud-init[921]: ci-info: +-------+-------------+---------+-----------+-------+ Oct 12 14:02:47 np0005481648.novalocal cloud-init[921]: ci-info: | Route | Destination | Gateway | Interface | Flags | Oct 12 14:02:47 np0005481648.novalocal cloud-init[921]: ci-info: +-------+-------------+---------+-----------+-------+ Oct 12 14:02:47 np0005481648.novalocal cloud-init[921]: ci-info: | 1 | fe80::/64 | :: | eth0 | U | Oct 12 14:02:47 np0005481648.novalocal cloud-init[921]: ci-info: | 3 | multicast | :: | eth0 | U | Oct 12 14:02:47 np0005481648.novalocal cloud-init[921]: ci-info: +-------+-------------+---------+-----------+-------+ Oct 12 14:02:48 np0005481648.novalocal useradd[987]: new group: name=cloud-user, GID=1001 Oct 12 14:02:48 np0005481648.novalocal useradd[987]: new user: name=cloud-user, UID=1001, GID=1001, home=/home/cloud-user, shell=/bin/bash, from=none Oct 12 14:02:48 np0005481648.novalocal useradd[987]: add 'cloud-user' to group 'adm' Oct 12 14:02:48 np0005481648.novalocal useradd[987]: add 'cloud-user' to group 'systemd-journal' Oct 12 14:02:48 np0005481648.novalocal useradd[987]: add 'cloud-user' to shadow group 'adm' Oct 12 14:02:48 np0005481648.novalocal useradd[987]: add 'cloud-user' to shadow group 'systemd-journal' Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: Generating public/private rsa key pair. Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: Your identification has been saved in /etc/ssh/ssh_host_rsa_key Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: Your public key has been saved in /etc/ssh/ssh_host_rsa_key.pub Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: The key fingerprint is: Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: SHA256:Slz12O7mgtJx5VfpXnIC1xQ6UMaLSXONjHDh/mhgUq0 root@np0005481648.novalocal Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: The key's randomart image is: Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: +---[RSA 3072]----+ Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: | .o+*oo..| Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: | .+Bo=...| Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: | ..ooBo.o.| Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: | . .. o+o.o.o| Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: | o.SE +.o.. | Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: | . .+ o.+ +.o| Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: | .. + ooo.+.| Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: | . o oo . | Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: | . .. | Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: +----[SHA256]-----+ Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: Generating public/private ecdsa key pair. Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: Your identification has been saved in /etc/ssh/ssh_host_ecdsa_key Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: Your public key has been saved in /etc/ssh/ssh_host_ecdsa_key.pub Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: The key fingerprint is: Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: SHA256:rC5r5qcTbesoAqOO9HqXwbOstTiaJmsJSIIopMTcYlM root@np0005481648.novalocal Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: The key's randomart image is: Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: +---[ECDSA 256]---+ Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: |o oE | Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: | O . | Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: |B o | Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: |*. . | Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: |= .. S | Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: |= .+o. | Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: |+o. .+*. | Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: |*++oBB+ | Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: |BB+OOOo | Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: +----[SHA256]-----+ Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: Generating public/private ed25519 key pair. Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: Your identification has been saved in /etc/ssh/ssh_host_ed25519_key Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: Your public key has been saved in /etc/ssh/ssh_host_ed25519_key.pub Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: The key fingerprint is: Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: SHA256:APaP6rBAfceqin4y//bLClqSQ4HX48hZ+51heP27OxU root@np0005481648.novalocal Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: The key's randomart image is: Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: +--[ED25519 256]--+ Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: | o | Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: |. o o | Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: |... + o | Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: | oo= o.= . E | Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: | o+.o.ooS . . | Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: |o . .oo+ o . . | Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: |.+.o... o .. | Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: |.+==o.. .. | Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: |o+Bo+oo+. ++ | Oct 12 14:02:48 np0005481648.novalocal cloud-init[921]: +----[SHA256]-----+ Oct 12 14:02:48 np0005481648.novalocal systemd[1]: Finished Cloud-init: Network Stage. Oct 12 14:02:48 np0005481648.novalocal systemd[1]: Reached target Cloud-config availability. Oct 12 14:02:48 np0005481648.novalocal systemd[1]: Reached target Network is Online. Oct 12 14:02:48 np0005481648.novalocal systemd[1]: Starting Cloud-init: Config Stage... Oct 12 14:02:48 np0005481648.novalocal systemd[1]: Starting Notify NFS peers of a restart... Oct 12 14:02:48 np0005481648.novalocal systemd[1]: Starting System Logging Service... Oct 12 14:02:48 np0005481648.novalocal sm-notify[1002]: Version 2.5.4 starting Oct 12 14:02:48 np0005481648.novalocal systemd[1]: Starting OpenSSH server daemon... Oct 12 14:02:48 np0005481648.novalocal systemd[1]: Starting Permit User Sessions... Oct 12 14:02:48 np0005481648.novalocal systemd[1]: Started Notify NFS peers of a restart. Oct 12 14:02:48 np0005481648.novalocal sshd[1004]: Server listening on 0.0.0.0 port 22. Oct 12 14:02:48 np0005481648.novalocal sshd[1004]: Server listening on :: port 22. Oct 12 14:02:48 np0005481648.novalocal systemd[1]: Started OpenSSH server daemon. Oct 12 14:02:48 np0005481648.novalocal systemd[1]: Finished Permit User Sessions. Oct 12 14:02:49 np0005481648.novalocal systemd[1]: Started Command Scheduler. Oct 12 14:02:49 np0005481648.novalocal systemd[1]: Started Getty on tty1. Oct 12 14:02:49 np0005481648.novalocal rsyslogd[1003]: [origin software="rsyslogd" swVersion="8.2506.0-2.el9" x-pid="1003" x-info="https://www.rsyslog.com"] start Oct 12 14:02:49 np0005481648.novalocal rsyslogd[1003]: imjournal: No statefile exists, /var/lib/rsyslog/imjournal.state will be created (ignore if this is first run): No such file or directory [v8.2506.0-2.el9 try https://www.rsyslog.com/e/2040 ] Oct 12 14:02:49 np0005481648.novalocal systemd[1]: Started Serial Getty on ttyS0. Oct 12 14:02:49 np0005481648.novalocal crond[1006]: (CRON) STARTUP (1.5.7) Oct 12 14:02:49 np0005481648.novalocal crond[1006]: (CRON) INFO (Syslog will be used instead of sendmail.) Oct 12 14:02:49 np0005481648.novalocal crond[1006]: (CRON) INFO (RANDOM_DELAY will be scaled with factor 61% if used.) Oct 12 14:02:49 np0005481648.novalocal crond[1006]: (CRON) INFO (running with inotify support) Oct 12 14:02:49 np0005481648.novalocal systemd[1]: Reached target Login Prompts. Oct 12 14:02:49 np0005481648.novalocal systemd[1]: Started System Logging Service. Oct 12 14:02:49 np0005481648.novalocal systemd[1]: Reached target Multi-User System. Oct 12 14:02:49 np0005481648.novalocal systemd[1]: Starting Record Runlevel Change in UTMP... Oct 12 14:02:49 np0005481648.novalocal systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 12 14:02:49 np0005481648.novalocal systemd[1]: Finished Record Runlevel Change in UTMP. Oct 12 14:02:49 np0005481648.novalocal rsyslogd[1003]: imjournal: journal files changed, reloading... [v8.2506.0-2.el9 try https://www.rsyslog.com/e/0 ] Oct 12 14:02:49 np0005481648.novalocal cloud-init[1016]: Cloud-init v. 24.4-7.el9 running 'modules:config' at Sun, 12 Oct 2025 18:02:49 +0000. Up 9.90 seconds. Oct 12 14:02:49 np0005481648.novalocal systemd[1]: Finished Cloud-init: Config Stage. Oct 12 14:02:49 np0005481648.novalocal systemd[1]: Starting Cloud-init: Final Stage... Oct 12 14:02:49 np0005481648.novalocal cloud-init[1020]: Cloud-init v. 24.4-7.el9 running 'modules:final' at Sun, 12 Oct 2025 18:02:49 +0000. Up 10.27 seconds. Oct 12 14:02:49 np0005481648.novalocal cloud-init[1022]: ############################################################# Oct 12 14:02:49 np0005481648.novalocal cloud-init[1023]: -----BEGIN SSH HOST KEY FINGERPRINTS----- Oct 12 14:02:49 np0005481648.novalocal cloud-init[1025]: 256 SHA256:rC5r5qcTbesoAqOO9HqXwbOstTiaJmsJSIIopMTcYlM root@np0005481648.novalocal (ECDSA) Oct 12 14:02:49 np0005481648.novalocal cloud-init[1027]: 256 SHA256:APaP6rBAfceqin4y//bLClqSQ4HX48hZ+51heP27OxU root@np0005481648.novalocal (ED25519) Oct 12 14:02:49 np0005481648.novalocal cloud-init[1029]: 3072 SHA256:Slz12O7mgtJx5VfpXnIC1xQ6UMaLSXONjHDh/mhgUq0 root@np0005481648.novalocal (RSA) Oct 12 14:02:49 np0005481648.novalocal cloud-init[1030]: -----END SSH HOST KEY FINGERPRINTS----- Oct 12 14:02:49 np0005481648.novalocal cloud-init[1031]: ############################################################# Oct 12 14:02:49 np0005481648.novalocal cloud-init[1020]: Cloud-init v. 24.4-7.el9 finished at Sun, 12 Oct 2025 18:02:49 +0000. Datasource DataSourceConfigDrive [net,ver=2][source=/dev/sr0]. Up 10.45 seconds Oct 12 14:02:49 np0005481648.novalocal systemd[1]: Finished Cloud-init: Final Stage. Oct 12 14:02:49 np0005481648.novalocal systemd[1]: Reached target Cloud-init target. Oct 12 14:02:49 np0005481648.novalocal systemd[1]: Startup finished in 1.703s (kernel) + 2.984s (initrd) + 5.833s (userspace) = 10.522s. Oct 12 14:02:50 np0005481648.novalocal sshd-session[1038]: Unable to negotiate with 38.102.83.114 port 33736: no matching host key type found. Their offer: ssh-ed25519,ssh-ed25519-cert-v01@openssh.com [preauth] Oct 12 14:02:50 np0005481648.novalocal sshd-session[1042]: Unable to negotiate with 38.102.83.114 port 33748: no matching host key type found. Their offer: ecdsa-sha2-nistp384,ecdsa-sha2-nistp384-cert-v01@openssh.com [preauth] Oct 12 14:02:50 np0005481648.novalocal sshd-session[1044]: Unable to negotiate with 38.102.83.114 port 33752: no matching host key type found. Their offer: ecdsa-sha2-nistp521,ecdsa-sha2-nistp521-cert-v01@openssh.com [preauth] Oct 12 14:02:50 np0005481648.novalocal sshd-session[1036]: Connection closed by 38.102.83.114 port 33724 [preauth] Oct 12 14:02:50 np0005481648.novalocal sshd-session[1040]: Connection closed by 38.102.83.114 port 33738 [preauth] Oct 12 14:02:50 np0005481648.novalocal sshd-session[1050]: Unable to negotiate with 38.102.83.114 port 33776: no matching host key type found. Their offer: ssh-rsa,ssh-rsa-cert-v01@openssh.com [preauth] Oct 12 14:02:50 np0005481648.novalocal sshd-session[1046]: Connection closed by 38.102.83.114 port 33760 [preauth] Oct 12 14:02:50 np0005481648.novalocal sshd-session[1052]: Unable to negotiate with 38.102.83.114 port 33780: no matching host key type found. Their offer: ssh-dss,ssh-dss-cert-v01@openssh.com [preauth] Oct 12 14:02:50 np0005481648.novalocal sshd-session[1048]: Connection closed by 38.102.83.114 port 33770 [preauth] Oct 12 14:02:52 np0005481648.novalocal chronyd[795]: Selected source 206.108.0.131 (2.centos.pool.ntp.org) Oct 12 14:02:52 np0005481648.novalocal chronyd[795]: System clock TAI offset set to 37 seconds Oct 12 14:02:53 np0005481648.novalocal chronyd[795]: Selected source 54.39.23.64 (2.centos.pool.ntp.org) Oct 12 14:02:56 np0005481648.novalocal irqbalance[784]: Cannot change IRQ 25 affinity: Operation not permitted Oct 12 14:02:56 np0005481648.novalocal irqbalance[784]: IRQ 25 affinity is now unmanaged Oct 12 14:02:56 np0005481648.novalocal irqbalance[784]: Cannot change IRQ 31 affinity: Operation not permitted Oct 12 14:02:56 np0005481648.novalocal irqbalance[784]: IRQ 31 affinity is now unmanaged Oct 12 14:02:56 np0005481648.novalocal irqbalance[784]: Cannot change IRQ 28 affinity: Operation not permitted Oct 12 14:02:56 np0005481648.novalocal irqbalance[784]: IRQ 28 affinity is now unmanaged Oct 12 14:02:56 np0005481648.novalocal irqbalance[784]: Cannot change IRQ 32 affinity: Operation not permitted Oct 12 14:02:56 np0005481648.novalocal irqbalance[784]: IRQ 32 affinity is now unmanaged Oct 12 14:02:56 np0005481648.novalocal irqbalance[784]: Cannot change IRQ 30 affinity: Operation not permitted Oct 12 14:02:56 np0005481648.novalocal irqbalance[784]: IRQ 30 affinity is now unmanaged Oct 12 14:02:56 np0005481648.novalocal irqbalance[784]: Cannot change IRQ 29 affinity: Operation not permitted Oct 12 14:02:56 np0005481648.novalocal irqbalance[784]: IRQ 29 affinity is now unmanaged Oct 12 14:02:57 np0005481648.novalocal systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Oct 12 14:02:58 np0005481648.novalocal sshd-session[1055]: Accepted publickey for zuul-worker from 38.102.83.114 port 52426 ssh2: RSA SHA256:zhs3MiW0JhxzckYcMHQES8SMYHj1iGcomnyzmbiwor8 Oct 12 14:02:58 np0005481648.novalocal systemd[1]: Created slice User Slice of UID 1000. Oct 12 14:02:58 np0005481648.novalocal systemd[1]: Starting User Runtime Directory /run/user/1000... Oct 12 14:02:58 np0005481648.novalocal systemd-logind[791]: New session 1 of user zuul-worker. Oct 12 14:02:58 np0005481648.novalocal systemd[1]: Finished User Runtime Directory /run/user/1000. Oct 12 14:02:58 np0005481648.novalocal systemd[1]: Starting User Manager for UID 1000... Oct 12 14:02:58 np0005481648.novalocal systemd[1059]: pam_unix(systemd-user:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Oct 12 14:02:58 np0005481648.novalocal systemd[1059]: Queued start job for default target Main User Target. Oct 12 14:02:58 np0005481648.novalocal systemd[1059]: Created slice User Application Slice. Oct 12 14:02:58 np0005481648.novalocal systemd[1059]: Started Mark boot as successful after the user session has run 2 minutes. Oct 12 14:02:58 np0005481648.novalocal systemd[1059]: Started Daily Cleanup of User's Temporary Directories. Oct 12 14:02:58 np0005481648.novalocal systemd[1059]: Reached target Paths. Oct 12 14:02:58 np0005481648.novalocal systemd[1059]: Reached target Timers. Oct 12 14:02:58 np0005481648.novalocal systemd[1059]: Starting D-Bus User Message Bus Socket... Oct 12 14:02:58 np0005481648.novalocal systemd[1059]: Starting Create User's Volatile Files and Directories... Oct 12 14:02:58 np0005481648.novalocal systemd[1059]: Listening on D-Bus User Message Bus Socket. Oct 12 14:02:58 np0005481648.novalocal systemd[1059]: Reached target Sockets. Oct 12 14:02:58 np0005481648.novalocal systemd[1059]: Finished Create User's Volatile Files and Directories. Oct 12 14:02:58 np0005481648.novalocal systemd[1059]: Reached target Basic System. Oct 12 14:02:58 np0005481648.novalocal systemd[1059]: Reached target Main User Target. Oct 12 14:02:58 np0005481648.novalocal systemd[1059]: Startup finished in 139ms. Oct 12 14:02:58 np0005481648.novalocal systemd[1]: Started User Manager for UID 1000. Oct 12 14:02:58 np0005481648.novalocal systemd[1]: Started Session 1 of User zuul-worker. Oct 12 14:02:58 np0005481648.novalocal sshd-session[1055]: pam_unix(sshd:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Oct 12 14:02:59 np0005481648.novalocal python3[1141]: ansible-setup Invoked with gather_subset=['!all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 12 14:03:00 np0005481648.novalocal python3[1169]: ansible-ansible.legacy.setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 12 14:03:04 np0005481648.novalocal python3[1227]: ansible-setup Invoked with gather_subset=['network'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 12 14:03:05 np0005481648.novalocal python3[1267]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Oct 12 14:03:06 np0005481648.novalocal python3[1293]: ansible-authorized_key Invoked with user=zuul-worker state=present key=ssh-rsa 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 zuul-build-sshkey manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 12 14:03:07 np0005481648.novalocal python3[1317]: ansible-file Invoked with state=directory path=/home/zuul-worker/.ssh mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 12 14:03:07 np0005481648.novalocal python3[1416]: ansible-ansible.legacy.stat Invoked with path=/home/zuul-worker/.ssh/id_rsa follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 12 14:03:08 np0005481648.novalocal python3[1487]: ansible-ansible.legacy.copy Invoked with src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1760292187.3534062-163-25413176994558/source dest=/home/zuul-worker/.ssh/id_rsa mode=384 force=False _original_basename=fe2914f89a1e4001b48d2c38b4e21271_id_rsa follow=False checksum=3590f4232a7c3cd08621e59e42aa7fb681f16e34 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 12 14:03:08 np0005481648.novalocal python3[1610]: ansible-ansible.legacy.stat Invoked with path=/home/zuul-worker/.ssh/id_rsa.pub follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 12 14:03:09 np0005481648.novalocal python3[1681]: ansible-ansible.legacy.copy Invoked with src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1760292188.263068-174-14710442637821/source dest=/home/zuul-worker/.ssh/id_rsa.pub mode=420 force=False _original_basename=fe2914f89a1e4001b48d2c38b4e21271_id_rsa.pub follow=False checksum=426919e62627d80e525a5b28d233f769a33e4e00 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 12 14:03:10 np0005481648.novalocal python3[1729]: ansible-ping Invoked with data=pong Oct 12 14:03:11 np0005481648.novalocal python3[1754]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 12 14:03:12 np0005481648.novalocal python3[1812]: ansible-zuul_debug_info Invoked with ipv4_route_required=False ipv6_route_required=False image_manifest_files=['/etc/dib-builddate.txt', '/etc/image-hostname.txt'] image_manifest=None traceroute_host=None Oct 12 14:03:13 np0005481648.novalocal python3[1844]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 12 14:03:13 np0005481648.novalocal python3[1868]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 12 14:03:13 np0005481648.novalocal python3[1892]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 12 14:03:14 np0005481648.novalocal python3[1916]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 12 14:03:14 np0005481648.novalocal python3[1940]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 12 14:03:14 np0005481648.novalocal python3[1964]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 12 14:03:16 np0005481648.novalocal python3[1988]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Oct 12 14:03:17 np0005481648.novalocal systemd[1]: systemd-hostnamed.service: Deactivated successfully. Oct 12 14:03:17 np0005481648.novalocal sshd-session[1993]: Accepted publickey for zuul-worker from 38.102.83.114 port 48778 ssh2: RSA SHA256:1Dn2MRowr4/JD23t/nc2t2ZYu6d2KBHMsrl8ASdwyGQ Oct 12 14:03:17 np0005481648.novalocal systemd-logind[791]: New session 3 of user zuul-worker. Oct 12 14:03:17 np0005481648.novalocal systemd[1]: Started Session 3 of User zuul-worker. Oct 12 14:03:17 np0005481648.novalocal sshd-session[1993]: pam_unix(sshd:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Oct 12 14:03:20 np0005481648.novalocal sshd-session[1996]: Received disconnect from 38.102.83.114 port 48778:11: disconnected by user Oct 12 14:03:20 np0005481648.novalocal sshd-session[1996]: Disconnected from user zuul-worker 38.102.83.114 port 48778 Oct 12 14:03:20 np0005481648.novalocal sshd-session[1993]: pam_unix(sshd:session): session closed for user zuul-worker Oct 12 14:03:20 np0005481648.novalocal systemd[1]: session-3.scope: Deactivated successfully. Oct 12 14:03:20 np0005481648.novalocal systemd[1]: session-3.scope: Consumed 1.630s CPU time. Oct 12 14:03:20 np0005481648.novalocal systemd-logind[791]: Session 3 logged out. Waiting for processes to exit. Oct 12 14:03:20 np0005481648.novalocal systemd-logind[791]: Removed session 3. Oct 12 14:03:21 np0005481648.novalocal python3[2044]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 12 14:03:21 np0005481648.novalocal python3[2068]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 12 14:03:21 np0005481648.novalocal python3[2092]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 12 14:03:21 np0005481648.novalocal python3[2116]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 12 14:03:22 np0005481648.novalocal python3[2140]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 12 14:03:22 np0005481648.novalocal python3[2164]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 12 14:03:23 np0005481648.novalocal python3[2189]: ansible-ansible.legacy.command Invoked with _raw_params=sudo -n true zuul_log_id=fa163ec2-ffbe-2fbb-156d-000000000028-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 12 14:03:23 np0005481648.novalocal sudo[2190]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/true Oct 12 14:03:23 np0005481648.novalocal sudo[2190]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:03:23 np0005481648.novalocal sudo[2190]: pam_unix(sudo:session): session closed for user root Oct 12 14:03:23 np0005481648.novalocal python3[2218]: ansible-file Invoked with path=/home/zuul-worker/.pydistutils.cfg state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 12 14:03:24 np0005481648.novalocal sudo[2294]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ihysuftzptohaqirnfbuelraqvspindb ; /usr/bin/python3' Oct 12 14:03:24 np0005481648.novalocal sudo[2294]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:03:24 np0005481648.novalocal python3[2296]: ansible-ansible.legacy.stat Invoked with path=/etc/pip.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 12 14:03:24 np0005481648.novalocal sudo[2294]: pam_unix(sudo:session): session closed for user root Oct 12 14:03:24 np0005481648.novalocal sudo[2367]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jqlwhbzlilmyragwbfizafldtpcgmsah ; /usr/bin/python3' Oct 12 14:03:24 np0005481648.novalocal sudo[2367]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:03:24 np0005481648.novalocal python3[2369]: ansible-ansible.legacy.copy Invoked with dest=/etc/pip.conf group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1760292204.2136495-91-43176243499234/source follow=False _original_basename=pip.conf.j2 checksum=5b65c9094402b8db60a77928be1f816342638afe backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Oct 12 14:03:25 np0005481648.novalocal sudo[2367]: pam_unix(sudo:session): session closed for user root Oct 12 14:03:25 np0005481648.novalocal sudo[2469]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-nfrqxdpskfxqojecepjbxqbebzrazgap ; /usr/bin/python3' Oct 12 14:03:25 np0005481648.novalocal sudo[2469]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:03:25 np0005481648.novalocal python3[2471]: ansible-ansible.legacy.stat Invoked with path=/etc/yum.repos.d/centos.repo follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 12 14:03:25 np0005481648.novalocal sudo[2469]: pam_unix(sudo:session): session closed for user root Oct 12 14:03:25 np0005481648.novalocal sudo[2544]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-dvofbwtdzpphmxuumneohmluyydxfkmy ; /usr/bin/python3' Oct 12 14:03:25 np0005481648.novalocal sudo[2544]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:03:26 np0005481648.novalocal python3[2546]: ansible-ansible.legacy.copy Invoked with dest=/etc/yum.repos.d/centos.repo group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1760292205.3732152-103-134473295633746/source follow=False _original_basename=centos.repo.j2 checksum=0268eb1686bc9b047a2096dbaf287658b0d20a19 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Oct 12 14:03:26 np0005481648.novalocal sudo[2544]: pam_unix(sudo:session): session closed for user root Oct 12 14:03:26 np0005481648.novalocal sudo[2646]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ejrvsituvyouhnfcimzehorezlbdtxvd ; /usr/bin/python3' Oct 12 14:03:26 np0005481648.novalocal sudo[2646]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:03:26 np0005481648.novalocal python3[2648]: ansible-ansible.legacy.stat Invoked with path=/etc/yum.repos.d/centos-addons.repo follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 12 14:03:26 np0005481648.novalocal sudo[2646]: pam_unix(sudo:session): session closed for user root Oct 12 14:03:26 np0005481648.novalocal sudo[2721]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-hxkguuojbkfpiekzfykchomxnalseppk ; /usr/bin/python3' Oct 12 14:03:26 np0005481648.novalocal sudo[2721]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:03:27 np0005481648.novalocal python3[2723]: ansible-ansible.legacy.copy Invoked with dest=/etc/yum.repos.d/centos-addons.repo group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1760292206.2955546-103-18412066288269/source follow=False _original_basename=centos-addons.repo.j2 checksum=2917e612982cadeb3009a3bf37bf30cbcd7f2044 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Oct 12 14:03:27 np0005481648.novalocal sudo[2721]: pam_unix(sudo:session): session closed for user root Oct 12 14:03:27 np0005481648.novalocal sudo[2771]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-mogeepduyfccptjrroktgysxhzmtpjon ; /usr/bin/python3' Oct 12 14:03:27 np0005481648.novalocal sudo[2771]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:03:27 np0005481648.novalocal python3[2773]: ansible-ini_file Invoked with path=/etc/dnf.conf section=main option=deltarpm value=0 mode=420 backup=False state=present exclusive=True no_extra_spaces=False ignore_spaces=False allow_no_value=False create=True follow=False unsafe_writes=False values=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 12 14:03:27 np0005481648.novalocal python3[2773]: ansible-ini_file [WARNING] Module remote_tmp /root/.ansible/tmp did not exist and was created with a mode of 0700, this may cause issues when running as another user. To avoid this, create the remote_tmp dir with the correct permissions manually Oct 12 14:03:27 np0005481648.novalocal sudo[2771]: pam_unix(sudo:session): session closed for user root Oct 12 14:03:27 np0005481648.novalocal sudo[2797]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-gfcczjesalpjwfdqkfxgiiwtjmwxmccr ; /usr/bin/python3' Oct 12 14:03:27 np0005481648.novalocal sudo[2797]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:03:28 np0005481648.novalocal python3[2799]: ansible-ansible.legacy.command Invoked with _raw_params=dnf clean all zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 12 14:03:28 np0005481648.novalocal sudo[2797]: pam_unix(sudo:session): session closed for user root Oct 12 14:03:28 np0005481648.novalocal sudo[2825]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-npvzyjkkvvlgitripzxvfhrhijfjqegl ; /usr/bin/python3' Oct 12 14:03:28 np0005481648.novalocal sudo[2825]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:03:28 np0005481648.novalocal python3[2827]: ansible-ansible.legacy.command Invoked with _raw_params=dnf makecache -v zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 12 14:03:39 np0005481648.novalocal sudo[2825]: pam_unix(sudo:session): session closed for user root Oct 12 14:03:40 np0005481648.novalocal python3[2868]: ansible-file Invoked with path=/home/zuul-worker/workspace state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 12 14:03:41 np0005481648.novalocal python3[2893]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=PYTHON2=0 PYTHON3=1 # Not all platforms install a `pip` when installing python # specific pip packages. We first check if pip$VERSION is # available and if not fallback to checking if just `pip` # is present. if [ "$PYTHON2" -eq "1" ] ; then command -v pip2 || command -v pip || exit 1 python2 -m wheel --help || exit 1 fi if [ "$PYTHON3" -eq "1" ] ; then command -v pip3 || command -v pip || exit 1 python3 -m wheel --help || exit 1 fi _uses_shell=True zuul_log_id=fa163ec2-ffbe-9f86-db86-000000000089-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Oct 12 14:03:41 np0005481648.novalocal sudo[2921]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-cvtjykdmqvhdaotdwdxbstjubungrius ; /usr/bin/python3' Oct 12 14:03:41 np0005481648.novalocal sudo[2921]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:03:41 np0005481648.novalocal python3[2923]: ansible-ansible.legacy.dnf Invoked with name=['python3-pip', 'python3-setuptools', 'python3-wheel'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 12 14:03:43 np0005481648.novalocal systemd[1]: Starting PackageKit Daemon... Oct 12 14:03:43 np0005481648.novalocal PackageKit[2929]: daemon start Oct 12 14:03:43 np0005481648.novalocal systemd[1]: Starting Authorization Manager... Oct 12 14:03:43 np0005481648.novalocal polkitd[2933]: Started polkitd version 0.117 Oct 12 14:03:43 np0005481648.novalocal polkitd[2933]: Loading rules from directory /etc/polkit-1/rules.d Oct 12 14:03:43 np0005481648.novalocal polkitd[2933]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 12 14:03:43 np0005481648.novalocal polkitd[2933]: Finished loading, compiling and executing 3 rules Oct 12 14:03:43 np0005481648.novalocal polkitd[2933]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Oct 12 14:03:43 np0005481648.novalocal systemd[1]: Started Authorization Manager. Oct 12 14:03:43 np0005481648.novalocal systemd[1]: Started PackageKit Daemon. Oct 12 14:03:43 np0005481648.novalocal sudo[2921]: pam_unix(sudo:session): session closed for user root Oct 12 14:03:44 np0005481648.novalocal python3[2973]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=command -v python3 _uses_shell=True zuul_log_id=fa163ec2-ffbe-9f86-db86-000000000093-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Oct 12 14:03:45 np0005481648.novalocal python3[3001]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=command -v tox /home/zuul-worker/.local/tox/bin/tox || exit 1 _uses_shell=True zuul_log_id=fa163ec2-ffbe-9f86-db86-000000000021-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Oct 12 14:03:46 np0005481648.novalocal python3[3029]: ansible-ansible.legacy.command Invoked with _raw_params=/usr/bin/python3 -m venv /home/zuul-worker/.local/tox zuul_log_id=fa163ec2-ffbe-9f86-db86-000000000024-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 12 14:03:49 np0005481648.novalocal python3[3061]: ansible-ansible.legacy.command Invoked with _raw_params=/home/zuul-worker/.local/tox/bin/pip install tox zuul_log_id=fa163ec2-ffbe-9f86-db86-000000000025-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 12 14:03:52 np0005481648.novalocal python3[3091]: ansible-ansible.legacy.command Invoked with _raw_params=/home/zuul-worker/.local/tox/bin/tox --version zuul_log_id=fa163ec2-ffbe-9f86-db86-000000000028-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 12 14:03:53 np0005481648.novalocal sudo[3118]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-drxtwcylwovvxxmunwqmmawstmfahjpb ; /usr/bin/python3' Oct 12 14:03:53 np0005481648.novalocal sudo[3118]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:03:53 np0005481648.novalocal python3[3120]: ansible-file Invoked with state=link src=/home/zuul-worker/.local/tox/bin/tox dest=/usr/local/bin/tox path=/usr/local/bin/tox recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 12 14:03:53 np0005481648.novalocal sudo[3118]: pam_unix(sudo:session): session closed for user root Oct 12 14:03:54 np0005481648.novalocal python3[3145]: ansible-ansible.legacy.command Invoked with _raw_params=export WBASE="/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo"; mkdir -p $WBASE/playbooks/roles ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-common" $WBASE/playbooks/roles/common; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-logs" $WBASE/playbooks/roles/logs; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-kolla" $WBASE/playbooks/roles/kolla; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-packstack" $WBASE/playbooks/roles/packstack; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-puppet-openstack" $WBASE/playbooks/roles/puppet-openstack; # noqa 204 ln -s "/home/zuul-worker/src/github.com/openstack-k8s-operators/ci-framework/roles/build_containers" $WBASE/playbooks/roles/build_containers; # noqa 204 _uses_shell=True zuul_log_id=fa163ec2-ffbe-9f86-db86-00000000003f-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 12 14:03:54 np0005481648.novalocal sudo[3178]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-glzqqnecwddyeyowsicuaotjwidbenve ; /usr/bin/python3' Oct 12 14:03:54 np0005481648.novalocal sudo[3178]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:03:54 np0005481648.novalocal python3[3180]: ansible-file Invoked with path=/etc/ci state=directory owner=root group=root mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 12 14:03:54 np0005481648.novalocal sudo[3178]: pam_unix(sudo:session): session closed for user root Oct 12 14:03:55 np0005481648.novalocal sudo[3256]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jlxmsmyfbbtambaokrpiucqtxdsaxbxx ; /usr/bin/python3' Oct 12 14:03:55 np0005481648.novalocal sudo[3256]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:03:55 np0005481648.novalocal python3[3258]: ansible-ansible.legacy.stat Invoked with path=/etc/ci/mirror_info.sh follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 12 14:03:55 np0005481648.novalocal sudo[3256]: pam_unix(sudo:session): session closed for user root Oct 12 14:03:55 np0005481648.novalocal sudo[3329]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-zakeivxuscpgisisbtcxurrhvfgvkyzn ; /usr/bin/python3' Oct 12 14:03:55 np0005481648.novalocal sudo[3329]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:03:55 np0005481648.novalocal python3[3331]: ansible-ansible.legacy.copy Invoked with dest=/etc/ci/mirror_info.sh owner=root group=root mode=420 src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1760292234.8725662-81-235550160108618/source follow=False _original_basename=mirror_info.sh.j2 checksum=ea5d641d750b2605d80a15d4106dfb6027081c92 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Oct 12 14:03:55 np0005481648.novalocal sudo[3329]: pam_unix(sudo:session): session closed for user root Oct 12 14:03:56 np0005481648.novalocal sudo[3380]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-nqnxlthwjrhrwxpafntuzijozkptcxur ; /usr/bin/python3' Oct 12 14:03:56 np0005481648.novalocal sudo[3380]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:03:56 np0005481648.novalocal python3[3382]: ansible-ansible.legacy.command Invoked with _raw_params=dnf install -y python3-pip rpmlint python3-rpm _uses_shell=True zuul_log_id=fa163ec2-ffbe-9f86-db86-000000000052-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 12 14:03:56 np0005481648.novalocal irqbalance[784]: Cannot change IRQ 27 affinity: Operation not permitted Oct 12 14:03:56 np0005481648.novalocal irqbalance[784]: IRQ 27 affinity is now unmanaged Oct 12 14:03:56 np0005481648.novalocal sudo[3380]: pam_unix(sudo:session): session closed for user root Oct 12 14:03:57 np0005481648.novalocal python3[3409]: ansible-pip Invoked with name=['rdopkg'] virtualenv=/home/zuul-worker/rdopkg-venv virtualenv_command=/usr/bin/python3 -m venv virtualenv_site_packages=True state=present editable=False version=None requirements=None virtualenv_python=None extra_args=None chdir=None executable=None umask=None Oct 12 14:04:05 np0005481648.novalocal python3[3442]: ansible-ansible.legacy.command Invoked with _raw_params=set -e -x source '/home/zuul-worker/rdopkg-venv/bin/activate' MASTER="$(rdopkg info | grep -e "in development phase" | awk '{print $1}')" RELEASE="epoxy" DIST_VER="9" # Find out if it is puppet or packstack and scenario if [[ "weirdo-epoxy-promote-puppet-scenario005-centos-stream-9" == *"puppet"* ]]; then project="puppet-openstack" else project="packstack" fi scenario="scenario005" # Set version related variables if [ $RELEASE = $MASTER ]; then VERSION="master" O_RELEASE="master" else VERSION="$(rdopkg release -r "$RELEASE" | grep upstream_branch | awk '{print $2}')" O_RELEASE="$RELEASE" fi if [[ "promotion" == "promotion" ]]; then enable_puppet_modules_rpm=false dlrn_repo="puppet-ci-testing" else enable_puppet_modules_rpm=true dlrn_repo="puppet-passed-ci" fi # Prepare Ansible inventory to use localhost pushd /home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo cat <hosts localhost ansible_connection=local ansible_python_interpreter=/usr/bin/python3 [openstack_nodes] localhost log_destination=/var/log/weirdo EOF REPOS_URL="http://trunk.rdoproject.org/centos${DIST_VER}-${O_RELEASE}/${dlrn_repo}/delorean.repo,https://trunk.rdoproject.org/centos${DIST_VER}-${O_RELEASE}/delorean-deps.repo" # noqa 204 tox -e ansible-playbook -- -vv -b -i hosts playbooks/$project-$scenario.yml \ -e version=$VERSION \ -e openstack_release=$O_RELEASE \ -e selinux_enforcing="false" \ -e tempest_from_source=false \ -e enable_puppet_modules_rpm=${enable_puppet_modules_rpm} \ -e trunk_repositories=$REPOS_URL \ _uses_shell=True zuul_log_id=fa163ec2-ffbe-9f86-db86-000000000005-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 12 14:05:03 np0005481648.novalocal systemd[1059]: Starting Mark boot as successful... Oct 12 14:05:03 np0005481648.novalocal systemd[1059]: Finished Mark boot as successful. Oct 12 14:05:19 np0005481648.novalocal sudo[3733]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-yoamjefgrntxtwguujwmtlaajndvbwji ; /usr/bin/python3' Oct 12 14:05:19 np0005481648.novalocal sudo[3733]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:05:19 np0005481648.novalocal python3[3735]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=* fact_path=/etc/ansible/facts.d Oct 12 14:05:20 np0005481648.novalocal sudo[3733]: pam_unix(sudo:session): session closed for user root Oct 12 14:05:20 np0005481648.novalocal sudo[3773]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ebvyspdxkprezjtpvksbwbqbntevjesd ; /usr/bin/python3' Oct 12 14:05:20 np0005481648.novalocal sudo[3773]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:05:20 np0005481648.novalocal python3[3775]: ansible-command Invoked with _raw_params=sudo dnf config-manager --enable crb _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 12 14:05:20 np0005481648.novalocal python3[3775]: ansible-command [WARNING] Consider using 'become', 'become_method', and 'become_user' rather than running sudo Oct 12 14:05:20 np0005481648.novalocal sudo[3776]: root : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/dnf config-manager --enable crb Oct 12 14:05:20 np0005481648.novalocal sudo[3776]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:05:20 np0005481648.novalocal sudo[3776]: pam_unix(sudo:session): session closed for user root Oct 12 14:05:20 np0005481648.novalocal sudo[3773]: pam_unix(sudo:session): session closed for user root Oct 12 14:05:21 np0005481648.novalocal sudo[3787]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jmsuocidzrkzonegkqkauudzkqrsugzr ; /usr/bin/python3' Oct 12 14:05:21 np0005481648.novalocal sudo[3787]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:05:21 np0005481648.novalocal python3[3789]: ansible-systemd Invoked with name=firewalld state=stopped daemon_reload=False daemon_reexec=False no_block=False enabled=None force=None masked=None user=None scope=None Oct 12 14:05:21 np0005481648.novalocal sudo[3787]: pam_unix(sudo:session): session closed for user root Oct 12 14:05:21 np0005481648.novalocal sudo[3798]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-vbtagainmdgktnhbypbrwsnnjfiobgjy ; /usr/bin/python3' Oct 12 14:05:21 np0005481648.novalocal sudo[3798]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:05:22 np0005481648.novalocal python3[3800]: ansible-dnf Invoked with name=['firewalld'] state=absent allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 12 14:05:22 np0005481648.novalocal sudo[3798]: pam_unix(sudo:session): session closed for user root Oct 12 14:05:22 np0005481648.novalocal sudo[3816]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-xppfpedrbknsfciwlgjxgweuaonfqlve ; /usr/bin/python3' Oct 12 14:05:22 np0005481648.novalocal sudo[3816]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:05:23 np0005481648.novalocal python3[3818]: ansible-dnf Invoked with name=['tuned', 'subscription-manager'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 12 14:05:26 np0005481648.novalocal dbus-broker-launch[765]: Noticed file-system modification, trigger reload. Oct 12 14:05:26 np0005481648.novalocal dbus-broker-launch[765]: Noticed file-system modification, trigger reload. Oct 12 14:05:26 np0005481648.novalocal dbus-broker-launch[765]: Noticed file-system modification, trigger reload. Oct 12 14:05:26 np0005481648.novalocal dbus-broker-launch[765]: Noticed file-system modification, trigger reload. Oct 12 14:05:26 np0005481648.novalocal dbus-broker-launch[765]: Noticed file-system modification, trigger reload. Oct 12 14:05:26 np0005481648.novalocal dbus-broker-launch[765]: Noticed file-system modification, trigger reload. Oct 12 14:05:26 np0005481648.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 12 14:05:26 np0005481648.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 12 14:05:26 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:05:27 np0005481648.novalocal systemd-rc-local-generator[3889]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:05:27 np0005481648.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 12 14:05:29 np0005481648.novalocal sudo[3816]: pam_unix(sudo:session): session closed for user root Oct 12 14:05:29 np0005481648.novalocal sudo[5906]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-wlyuzagswbkkqcgdzczrrwliklptrssj ; /usr/bin/python3' Oct 12 14:05:29 np0005481648.novalocal sudo[5906]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:05:29 np0005481648.novalocal python3[5918]: ansible-systemd Invoked with name=tuned enabled=True state=started daemon_reload=False daemon_reexec=False no_block=False force=None masked=None user=None scope=None Oct 12 14:05:29 np0005481648.novalocal systemd[1]: Starting Dynamic System Tuning Daemon... Oct 12 14:05:30 np0005481648.novalocal systemd[1]: Started Dynamic System Tuning Daemon. Oct 12 14:05:30 np0005481648.novalocal sudo[5906]: pam_unix(sudo:session): session closed for user root Oct 12 14:05:30 np0005481648.novalocal sudo[6883]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-sgoifnmqargnhddpeueigtfpqxrefhbh ; /usr/bin/python3' Oct 12 14:05:30 np0005481648.novalocal sudo[6883]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:05:30 np0005481648.novalocal python3[6910]: ansible-command Invoked with _raw_params=tuned-adm active warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 12 14:05:30 np0005481648.novalocal sudo[6883]: pam_unix(sudo:session): session closed for user root Oct 12 14:05:30 np0005481648.novalocal sudo[7254]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-qrjjgksqxmwlnszzmcqudhxzfllvpnty ; /usr/bin/python3' Oct 12 14:05:30 np0005481648.novalocal sudo[7254]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:05:31 np0005481648.novalocal python3[7271]: ansible-command Invoked with _raw_params=tuned-adm profile throughput-performance warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 12 14:05:32 np0005481648.novalocal sudo[7254]: pam_unix(sudo:session): session closed for user root Oct 12 14:05:32 np0005481648.novalocal sudo[8230]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-bsvvprgezeengofwmkxqfhnyxhxynarz ; /usr/bin/python3' Oct 12 14:05:32 np0005481648.novalocal sudo[8230]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:05:32 np0005481648.novalocal python3[8249]: ansible-file Invoked with path=/var/log/weirdo state=directory recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Oct 12 14:05:32 np0005481648.novalocal sudo[8230]: pam_unix(sudo:session): session closed for user root Oct 12 14:05:32 np0005481648.novalocal sudo[8403]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-djznudqaaotpklyborsscvuhevodgouw ; /usr/bin/python3' Oct 12 14:05:32 np0005481648.novalocal sudo[8403]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:05:32 np0005481648.novalocal python3[8415]: ansible-file Invoked with path=/var/log/weirdo-project state=directory recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Oct 12 14:05:32 np0005481648.novalocal sudo[8403]: pam_unix(sudo:session): session closed for user root Oct 12 14:05:33 np0005481648.novalocal sudo[8878]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-wagkffvgwtlbbtlcedatrfkxfrxwxgfz ; /usr/bin/python3' Oct 12 14:05:33 np0005481648.novalocal sudo[8878]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:05:33 np0005481648.novalocal python3[8892]: ansible-get_url Invoked with url=http://trunk.rdoproject.org/centos9-epoxy/puppet-ci-testing/delorean.repo dest=/etc/yum.repos.d/ force=False http_agent=ansible-httpget use_proxy=True validate_certs=True force_basic_auth=False sha256sum= checksum= timeout=10 follow=False unsafe_writes=False url_username=None url_password=NOT_LOGGING_PARAMETER client_cert=None client_key=None backup=None headers=None tmp_dest=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None content=NOT_LOGGING_PARAMETER remote_src=None regexp=None delimiter=None directory_mode=None Oct 12 14:05:33 np0005481648.novalocal sudo[8878]: pam_unix(sudo:session): session closed for user root Oct 12 14:05:33 np0005481648.novalocal sudo[9111]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-nfqovephiblueelgphhchokuyaajsetb ; /usr/bin/python3' Oct 12 14:05:33 np0005481648.novalocal sudo[9111]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:05:33 np0005481648.novalocal python3[9131]: ansible-get_url Invoked with url=https://trunk.rdoproject.org/centos9-epoxy/delorean-deps.repo dest=/etc/yum.repos.d/ force=False http_agent=ansible-httpget use_proxy=True validate_certs=True force_basic_auth=False sha256sum= checksum= timeout=10 follow=False unsafe_writes=False url_username=None url_password=NOT_LOGGING_PARAMETER client_cert=None client_key=None backup=None headers=None tmp_dest=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None content=NOT_LOGGING_PARAMETER remote_src=None regexp=None delimiter=None directory_mode=None Oct 12 14:05:33 np0005481648.novalocal sudo[9111]: pam_unix(sudo:session): session closed for user root Oct 12 14:05:33 np0005481648.novalocal sudo[9373]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-rmvvkvcpqxymybnixgiejrcjmhxtfmgs ; /usr/bin/python3' Oct 12 14:05:33 np0005481648.novalocal sudo[9373]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:05:34 np0005481648.novalocal python3[9388]: ansible-command Invoked with _raw_params=if [ -f /etc/ci/mirror_info.sh ]; then source /etc/ci/mirror_info.sh sed -i -e "s|https://trunk.rdoproject.org|${NODEPOOL_RDO_PROXY}|g" /etc/yum.repos.d/*.repo # For CentOS8 sed -i -e "s|http://mirror.centos.org/centos|${NODEPOOL_CENTOS_MIRROR}|g" /etc/yum.repos.d/*.repo # For CentOS9 sed -i -e "s|http://mirror.stream.centos.org|${NODEPOOL_CENTOS_MIRROR}|g" /etc/yum.repos.d/*.repo fi _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 12 14:05:34 np0005481648.novalocal sudo[9373]: pam_unix(sudo:session): session closed for user root Oct 12 14:05:34 np0005481648.novalocal sudo[9687]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-lrdhmqrnomguwuzxkcynuuprkbhqfgyw ; /usr/bin/python3' Oct 12 14:05:34 np0005481648.novalocal sudo[9687]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:05:34 np0005481648.novalocal python3[9708]: ansible-command Invoked with _raw_params=repoquery --disablerepo='*' --enablerepo='delorean*' -a --qf '%{sourcerpm}'|sort -u|sed 's/.src.rpm//g' >/var/log/weirdo/rdo-trunk-deps-start.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 12 14:05:37 np0005481648.novalocal sudo[9687]: pam_unix(sudo:session): session closed for user root Oct 12 14:05:37 np0005481648.novalocal sudo[10840]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-savunmsxsnrpdhaepfrvblrgpftdfcgf ; /usr/bin/python3' Oct 12 14:05:37 np0005481648.novalocal sudo[10840]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:05:37 np0005481648.novalocal python3[10848]: ansible-command Invoked with _raw_params=dnf clean all _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 12 14:05:37 np0005481648.novalocal python3[10848]: ansible-command [WARNING] Consider using the dnf module rather than running 'dnf'. If you need to use command because dnf is insufficient you can add 'warn: false' to this command task or set 'command_warnings=False' in ansible.cfg to get rid of this message. Oct 12 14:05:38 np0005481648.novalocal sudo[10840]: pam_unix(sudo:session): session closed for user root Oct 12 14:05:38 np0005481648.novalocal sudo[11129]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-aancemoyrntzjxrmtmpzakmlfowcmkcb ; /usr/bin/python3' Oct 12 14:05:38 np0005481648.novalocal sudo[11129]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:05:38 np0005481648.novalocal python3[11138]: ansible-dnf Invoked with name=['*'] state=latest allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 12 14:06:10 np0005481648.novalocal sudo[11129]: pam_unix(sudo:session): session closed for user root Oct 12 14:06:10 np0005481648.novalocal sudo[22054]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-mfruomdatcfkamhzerufszlpdqwcbywd ; /usr/bin/python3' Oct 12 14:06:10 np0005481648.novalocal sudo[22054]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:06:10 np0005481648.novalocal python3[22065]: ansible-dnf Invoked with name=['gettext', 'diffstat', 'doxygen', 'patch', 'patchutils', 'subversion', 'systemtap', 'git', 'wget', 'python3-libselinux', 'python3-setuptools', 'rubygem-rexml'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 12 14:06:18 np0005481648.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 12 14:06:18 np0005481648.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 12 14:06:18 np0005481648.novalocal systemd[1]: man-db-cache-update.service: Consumed 56.562s CPU time. Oct 12 14:06:18 np0005481648.novalocal systemd[1]: run-r01721895e9034de9851a79ed1b37ced6.service: Deactivated successfully. Oct 12 14:06:27 np0005481648.novalocal dbus-broker-launch[765]: Noticed file-system modification, trigger reload. Oct 12 14:06:27 np0005481648.novalocal dbus-broker-launch[765]: Noticed file-system modification, trigger reload. Oct 12 14:07:08 np0005481648.novalocal groupadd[41486]: group added to /etc/group: name=rtkit, GID=172 Oct 12 14:07:08 np0005481648.novalocal groupadd[41486]: group added to /etc/gshadow: name=rtkit Oct 12 14:07:08 np0005481648.novalocal groupadd[41486]: new group: name=rtkit, GID=172 Oct 12 14:07:08 np0005481648.novalocal useradd[41494]: new user: name=rtkit, UID=172, GID=172, home=/, shell=/sbin/nologin, from=none Oct 12 14:07:08 np0005481648.novalocal dbus-broker-launch[765]: Noticed file-system modification, trigger reload. Oct 12 14:07:08 np0005481648.novalocal dbus-broker-launch[765]: Noticed file-system modification, trigger reload. Oct 12 14:07:08 np0005481648.novalocal dbus-broker-launch[765]: Noticed file-system modification, trigger reload. Oct 12 14:07:09 np0005481648.novalocal dbus-broker-launch[765]: Noticed file-system modification, trigger reload. Oct 12 14:07:09 np0005481648.novalocal dbus-broker-launch[765]: Noticed file-system modification, trigger reload. Oct 12 14:07:12 np0005481648.novalocal chronyd[795]: Selected source 206.108.0.131 (2.centos.pool.ntp.org) Oct 12 14:07:22 np0005481648.novalocal kernel: SELinux: Converting 432 SID table entries... Oct 12 14:07:22 np0005481648.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 12 14:07:22 np0005481648.novalocal kernel: SELinux: policy capability open_perms=1 Oct 12 14:07:22 np0005481648.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 12 14:07:22 np0005481648.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 12 14:07:22 np0005481648.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 12 14:07:22 np0005481648.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 12 14:07:22 np0005481648.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 12 14:07:30 np0005481648.novalocal groupadd[41559]: group added to /etc/group: name=pipewire, GID=993 Oct 12 14:07:30 np0005481648.novalocal groupadd[41559]: group added to /etc/gshadow: name=pipewire Oct 12 14:07:30 np0005481648.novalocal groupadd[41559]: new group: name=pipewire, GID=993 Oct 12 14:07:30 np0005481648.novalocal useradd[41566]: new user: name=pipewire, UID=993, GID=993, home=/run/pipewire, shell=/usr/sbin/nologin, from=none Oct 12 14:07:31 np0005481648.novalocal groupadd[41581]: group added to /etc/group: name=geoclue, GID=992 Oct 12 14:07:31 np0005481648.novalocal groupadd[41581]: group added to /etc/gshadow: name=geoclue Oct 12 14:07:31 np0005481648.novalocal groupadd[41581]: new group: name=geoclue, GID=992 Oct 12 14:07:31 np0005481648.novalocal useradd[41588]: new user: name=geoclue, UID=992, GID=992, home=/var/lib/geoclue, shell=/sbin/nologin, from=none Oct 12 14:07:31 np0005481648.novalocal dbus-broker-launch[765]: Noticed file-system modification, trigger reload. Oct 12 14:07:31 np0005481648.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=2 res=1 Oct 12 14:07:31 np0005481648.novalocal dbus-broker-launch[765]: Noticed file-system modification, trigger reload. Oct 12 14:07:31 np0005481648.novalocal dbus-broker-launch[765]: Noticed file-system modification, trigger reload. Oct 12 14:07:31 np0005481648.novalocal polkitd[2933]: Reloading rules Oct 12 14:07:31 np0005481648.novalocal polkitd[2933]: Collecting garbage unconditionally... Oct 12 14:07:31 np0005481648.novalocal polkitd[2933]: Loading rules from directory /etc/polkit-1/rules.d Oct 12 14:07:31 np0005481648.novalocal polkitd[2933]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 12 14:07:31 np0005481648.novalocal polkitd[2933]: Finished loading, compiling and executing 4 rules Oct 12 14:07:31 np0005481648.novalocal polkitd[2933]: Reloading rules Oct 12 14:07:31 np0005481648.novalocal polkitd[2933]: Collecting garbage unconditionally... Oct 12 14:07:31 np0005481648.novalocal polkitd[2933]: Loading rules from directory /etc/polkit-1/rules.d Oct 12 14:07:31 np0005481648.novalocal polkitd[2933]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 12 14:07:31 np0005481648.novalocal polkitd[2933]: Finished loading, compiling and executing 4 rules Oct 12 14:07:32 np0005481648.novalocal groupadd[41600]: group added to /etc/group: name=flatpak, GID=991 Oct 12 14:07:32 np0005481648.novalocal groupadd[41600]: group added to /etc/gshadow: name=flatpak Oct 12 14:07:32 np0005481648.novalocal groupadd[41600]: new group: name=flatpak, GID=991 Oct 12 14:07:32 np0005481648.novalocal useradd[41607]: new user: name=flatpak, UID=991, GID=991, home=/, shell=/usr/sbin/nologin, from=none Oct 12 14:07:32 np0005481648.novalocal dbus-broker-launch[765]: Noticed file-system modification, trigger reload. Oct 12 14:07:32 np0005481648.novalocal dbus-broker-launch[765]: Noticed file-system modification, trigger reload. Oct 12 14:07:32 np0005481648.novalocal dbus-broker-launch[765]: Noticed file-system modification, trigger reload. Oct 12 14:07:32 np0005481648.novalocal polkitd[2933]: Reloading rules Oct 12 14:07:32 np0005481648.novalocal polkitd[2933]: Collecting garbage unconditionally... Oct 12 14:07:32 np0005481648.novalocal polkitd[2933]: Loading rules from directory /etc/polkit-1/rules.d Oct 12 14:07:32 np0005481648.novalocal polkitd[2933]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 12 14:07:32 np0005481648.novalocal polkitd[2933]: Finished loading, compiling and executing 5 rules Oct 12 14:07:32 np0005481648.novalocal polkitd[2933]: Reloading rules Oct 12 14:07:32 np0005481648.novalocal polkitd[2933]: Collecting garbage unconditionally... Oct 12 14:07:32 np0005481648.novalocal polkitd[2933]: Loading rules from directory /etc/polkit-1/rules.d Oct 12 14:07:32 np0005481648.novalocal polkitd[2933]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 12 14:07:32 np0005481648.novalocal polkitd[2933]: Finished loading, compiling and executing 5 rules Oct 12 14:07:34 np0005481648.novalocal systemd[1]: Stopping OpenSSH server daemon... Oct 12 14:07:34 np0005481648.novalocal sshd[1004]: Received signal 15; terminating. Oct 12 14:07:34 np0005481648.novalocal systemd[1]: sshd.service: Deactivated successfully. Oct 12 14:07:34 np0005481648.novalocal systemd[1]: Stopped OpenSSH server daemon. Oct 12 14:07:34 np0005481648.novalocal systemd[1]: Stopped target sshd-keygen.target. Oct 12 14:07:34 np0005481648.novalocal systemd[1]: Stopping sshd-keygen.target... Oct 12 14:07:34 np0005481648.novalocal systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 12 14:07:34 np0005481648.novalocal systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 12 14:07:34 np0005481648.novalocal systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 12 14:07:34 np0005481648.novalocal systemd[1]: Reached target sshd-keygen.target. Oct 12 14:07:34 np0005481648.novalocal systemd[1]: Starting OpenSSH server daemon... Oct 12 14:07:34 np0005481648.novalocal sshd[41648]: Server listening on 0.0.0.0 port 22. Oct 12 14:07:34 np0005481648.novalocal sshd[41648]: Server listening on :: port 22. Oct 12 14:07:34 np0005481648.novalocal systemd[1]: Started OpenSSH server daemon. Oct 12 14:07:35 np0005481648.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 12 14:07:35 np0005481648.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 12 14:07:35 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:07:35 np0005481648.novalocal systemd-rc-local-generator[41739]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:07:35 np0005481648.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 12 14:07:41 np0005481648.novalocal sudo[22054]: pam_unix(sudo:session): session closed for user root Oct 12 14:07:41 np0005481648.novalocal sudo[47636]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jmbasqnxyqdsgdrzruxoqdgggqpajtuv ; /usr/bin/python3' Oct 12 14:07:41 np0005481648.novalocal sudo[47636]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:07:41 np0005481648.novalocal python3[47666]: ansible-dnf Invoked with name=['net-tools', 'lsof', 'sysstat', 'psmisc', 'dnf-utils'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 12 14:07:44 np0005481648.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 12 14:07:44 np0005481648.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 12 14:07:44 np0005481648.novalocal systemd[1]: man-db-cache-update.service: Consumed 10.167s CPU time. Oct 12 14:07:44 np0005481648.novalocal systemd[1]: run-r317a149aa3ed4fc5bffb6e2425db3d07.service: Deactivated successfully. Oct 12 14:07:46 np0005481648.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 12 14:07:46 np0005481648.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 12 14:07:46 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:07:47 np0005481648.novalocal systemd-rc-local-generator[49896]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:07:47 np0005481648.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 12 14:07:47 np0005481648.novalocal sudo[47636]: pam_unix(sudo:session): session closed for user root Oct 12 14:07:48 np0005481648.novalocal sudo[50272]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-pryftqnookgztqfsjmtfxioazqsfvnfb ; /usr/bin/python3' Oct 12 14:07:48 np0005481648.novalocal sudo[50272]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:07:48 np0005481648.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 12 14:07:48 np0005481648.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 12 14:07:48 np0005481648.novalocal systemd[1]: run-rc5d83957dbd74071b92fa7d2d107637a.service: Deactivated successfully. Oct 12 14:07:48 np0005481648.novalocal python3[50274]: ansible-replace Invoked with dest=/usr/lib/systemd/system/sysstat-collect.timer regexp=10 replace=1 path=/usr/lib/systemd/system/sysstat-collect.timer backup=False encoding=utf-8 follow=False unsafe_writes=False after=None before=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None force=None content=NOT_LOGGING_PARAMETER remote_src=None delimiter=None directory_mode=None Oct 12 14:07:48 np0005481648.novalocal sudo[50272]: pam_unix(sudo:session): session closed for user root Oct 12 14:07:48 np0005481648.novalocal sudo[50298]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-dbmwfpxsdzkjzummeykkzsoeqcijcmko ; /usr/bin/python3' Oct 12 14:07:48 np0005481648.novalocal sudo[50298]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:07:48 np0005481648.novalocal python3[50300]: ansible-systemd Invoked with name=sysstat enabled=True daemon_reload=True state=started daemon_reexec=False no_block=False force=None masked=None user=None scope=None Oct 12 14:07:48 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:07:48 np0005481648.novalocal systemd-rc-local-generator[50320]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:07:48 np0005481648.novalocal systemd[1]: Started Run system activity accounting tool every 1 minutes. Oct 12 14:07:48 np0005481648.novalocal systemd[1]: Started Generate summary of yesterday's process accounting. Oct 12 14:07:48 np0005481648.novalocal systemd[1]: Starting Resets System Activity Logs... Oct 12 14:07:48 np0005481648.novalocal systemd[1]: Finished Resets System Activity Logs. Oct 12 14:07:49 np0005481648.novalocal sudo[50298]: pam_unix(sudo:session): session closed for user root Oct 12 14:07:49 np0005481648.novalocal sudo[50347]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-zcqjqqfbwgvduhmplvxwtnbkspnuqaat ; /usr/bin/python3' Oct 12 14:07:49 np0005481648.novalocal sudo[50347]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:07:49 np0005481648.novalocal python3[50349]: ansible-lineinfile Invoked with dest=/etc/hosts line=127.0.0.1 np0005481648 np0005481648.novalocal state=present path=/etc/hosts backrefs=False create=False backup=False firstmatch=False follow=False unsafe_writes=False regexp=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None force=None content=NOT_LOGGING_PARAMETER remote_src=None delimiter=None directory_mode=None Oct 12 14:07:49 np0005481648.novalocal sudo[50347]: pam_unix(sudo:session): session closed for user root Oct 12 14:07:49 np0005481648.novalocal sudo[50357]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-qpmezhdjemnijseboalsmjswzghjfrmn ; /usr/bin/python3' Oct 12 14:07:49 np0005481648.novalocal sudo[50357]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:07:49 np0005481648.novalocal python3[50359]: ansible-dnf Invoked with name=['libxml2-devel', 'libxslt-devel', 'ruby-devel', 'rubygems', 'qemu-img'] state=latest allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 12 14:07:52 np0005481648.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 12 14:07:52 np0005481648.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 12 14:07:53 np0005481648.novalocal sudo[50357]: pam_unix(sudo:session): session closed for user root Oct 12 14:07:53 np0005481648.novalocal sudo[50686]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-yrmmeuhueucosvtpmcfqbjdfjnyasagr ; /usr/bin/python3' Oct 12 14:07:53 np0005481648.novalocal sudo[50686]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:07:53 np0005481648.novalocal python3[50688]: ansible-sysctl [WARNING] The value 0 (type int) in a string field was converted to '0' (type string). If this does not look like what you expect, quote the entire value to ensure it does not change. Oct 12 14:07:53 np0005481648.novalocal python3[50688]: ansible-sysctl Invoked with name=net.ipv6.conf.all.disable_ipv6 value=0 state=present reload=True sysctl_set=False ignoreerrors=False sysctl_file=/etc/sysctl.conf Oct 12 14:07:53 np0005481648.novalocal sudo[50686]: pam_unix(sudo:session): session closed for user root Oct 12 14:07:54 np0005481648.novalocal sudo[50698]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-rjyzurfoetrllzyoyctfuerfsksswkiq ; /usr/bin/python3' Oct 12 14:07:54 np0005481648.novalocal sudo[50698]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:07:54 np0005481648.novalocal python3[50700]: ansible-sysctl [WARNING] The value 0 (type int) in a string field was converted to '0' (type string). If this does not look like what you expect, quote the entire value to ensure it does not change. Oct 12 14:07:54 np0005481648.novalocal python3[50700]: ansible-sysctl Invoked with name=net.ipv6.conf.default.disable_ipv6 value=0 state=present reload=True sysctl_set=False ignoreerrors=False sysctl_file=/etc/sysctl.conf Oct 12 14:07:55 np0005481648.novalocal sudo[50698]: pam_unix(sudo:session): session closed for user root Oct 12 14:07:55 np0005481648.novalocal sudo[50709]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-pbiokihmccrpojkivonivtofrzojjbtl ; /usr/bin/python3' Oct 12 14:07:55 np0005481648.novalocal sudo[50709]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:07:55 np0005481648.novalocal python3[50711]: ansible-git Invoked with repo=https://review.opendev.org/openstack/puppet-openstack-integration dest=/tmp/puppet-openstack version=stable/2025.1 force=True remote=origin clone=True update=True verify_commit=False gpg_whitelist=[] accept_hostkey=False bare=False recursive=True track_submodules=False refspec=None reference=None depth=None key_file=None ssh_opts=None executable=None umask=None archive=None separate_git_dir=None Oct 12 14:07:57 np0005481648.novalocal sudo[50709]: pam_unix(sudo:session): session closed for user root Oct 12 14:07:57 np0005481648.novalocal sudo[50742]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-zqgudovfdpkhhetdvwupnhklvawlvbbv ; /usr/bin/python3' Oct 12 14:07:57 np0005481648.novalocal sudo[50742]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:07:57 np0005481648.novalocal python3[50744]: ansible-file Invoked with path=/tmp/puppet-openstack/.bundled_gems state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Oct 12 14:07:57 np0005481648.novalocal sudo[50742]: pam_unix(sudo:session): session closed for user root Oct 12 14:07:57 np0005481648.novalocal sudo[50766]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ueyfnekshcymxsqjhpxgxtpxwuemkfne ; /usr/bin/python3' Oct 12 14:07:57 np0005481648.novalocal sudo[50766]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:07:58 np0005481648.novalocal python3[50768]: ansible-file Invoked with path=/usr/zuul-env/bin/zuul-cloner state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Oct 12 14:07:58 np0005481648.novalocal sudo[50766]: pam_unix(sudo:session): session closed for user root Oct 12 14:07:58 np0005481648.novalocal sudo[50775]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ppurcpqrhnrqtntqjcldhgqefopqfhgi ; MANAGE_REPOS=false SCENARIO=scenario005 GEM_HOME=/tmp/puppet-openstack/.bundled_gems TEMPEST_VERSION=\'\' WORKSPACE=/var/log/weirdo-project TEMPEST_FROM_SOURCE=false PUPPETFILE_DIR=/etc/puppet/modules PUPPET_PKG=puppet PUPPET_ARGS=--modulepath=/usr/share/openstack-puppet/modules:/etc/puppet/modules SWAP_SIZE_GB=8 /usr/bin/python3' Oct 12 14:07:58 np0005481648.novalocal sudo[50775]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:07:58 np0005481648.novalocal python3[50777]: ansible-command Invoked with chdir=/tmp/puppet-openstack _raw_params=./run_tests.sh warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None executable=None creates=None removes=None stdin=None Oct 12 14:07:58 np0005481648.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 12 14:07:58 np0005481648.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 12 14:07:58 np0005481648.novalocal systemd[1]: run-rae16f57047854b9fa2cf03154edb0c0e.service: Deactivated successfully. Oct 12 14:08:03 np0005481648.novalocal systemd[1059]: Created slice User Background Tasks Slice. Oct 12 14:08:03 np0005481648.novalocal systemd[1059]: Starting Cleanup of User's Temporary Files and Directories... Oct 12 14:08:03 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:08:03 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:08:03 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:08:03 np0005481648.novalocal systemd[1059]: Finished Cleanup of User's Temporary Files and Directories. Oct 12 14:09:03 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:09:06 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:09:06 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:10:24 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:10:24 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:10:24 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:11:24 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:11:24 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:11:24 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:12:03 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:12:03 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:12:03 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:12:59 np0005481648.novalocal PackageKit[2929]: daemon quit Oct 12 14:12:59 np0005481648.novalocal systemd[1]: packagekit.service: Deactivated successfully. Oct 12 14:13:24 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:13:24 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:13:24 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:13:53 np0005481648.novalocal kernel: Adding 8388604k swap on /swapfile. Priority:-2 extents:22 across:9993672k Oct 12 14:14:03 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:14:03 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:14:03 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:14:38 np0005481648.novalocal groupadd[50863]: group added to /etc/group: name=puppet, GID=52 Oct 12 14:14:39 np0005481648.novalocal groupadd[50863]: group added to /etc/gshadow: name=puppet Oct 12 14:14:39 np0005481648.novalocal groupadd[50863]: new group: name=puppet, GID=52 Oct 12 14:14:40 np0005481648.novalocal useradd[50870]: new user: name=puppet, UID=52, GID=52, home=/var/lib/puppet, shell=/sbin/nologin, from=none Oct 12 14:14:46 np0005481648.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 12 14:14:46 np0005481648.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 12 14:14:46 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:14:46 np0005481648.novalocal systemd-rc-local-generator[50909]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:14:46 np0005481648.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 12 14:15:03 np0005481648.novalocal systemd[1]: Starting PackageKit Daemon... Oct 12 14:15:03 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:15:03 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:15:03 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:15:03 np0005481648.novalocal PackageKit[51392]: daemon start Oct 12 14:15:04 np0005481648.novalocal systemd[1]: Started PackageKit Daemon. Oct 12 14:15:33 np0005481648.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 12 14:15:33 np0005481648.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 12 14:15:33 np0005481648.novalocal systemd[1]: run-r3cd2d819ef2d40098e586a4d0822deae.service: Deactivated successfully. Oct 12 14:16:03 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:16:03 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:16:03 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:17:06 np0005481648.novalocal kernel: SELinux: Converting 464 SID table entries... Oct 12 14:17:06 np0005481648.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 12 14:17:06 np0005481648.novalocal kernel: SELinux: policy capability open_perms=1 Oct 12 14:17:06 np0005481648.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 12 14:17:06 np0005481648.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 12 14:17:06 np0005481648.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 12 14:17:06 np0005481648.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 12 14:17:06 np0005481648.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 12 14:17:07 np0005481648.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=3 res=1 Oct 12 14:17:07 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:17:07 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:17:07 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:17:09 np0005481648.novalocal systemd[1]: Starting PCP Reboot Initialization Helper Service... Oct 12 14:17:09 np0005481648.novalocal systemd[1]: Finished PCP Reboot Initialization Helper Service. Oct 12 14:17:09 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:17:09 np0005481648.novalocal systemd-rc-local-generator[52031]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:17:09 np0005481648.novalocal systemd[1]: Starting dnf makecache... Oct 12 14:17:10 np0005481648.novalocal dnf[52040]: Updating Subscription Management repositories. Oct 12 14:17:10 np0005481648.novalocal dnf[52040]: Unable to read consumer identity Oct 12 14:17:10 np0005481648.novalocal dnf[52040]: This system is not registered with an entitlement server. You can use subscription-manager to register. Oct 12 14:17:10 np0005481648.novalocal dnf[52040]: Failed determining last makecache time. Oct 12 14:17:10 np0005481648.novalocal dnf[52040]: delorean-openstack-barbican-3416cdce80f63f3e499 95 kB/s | 3.0 kB 00:00 Oct 12 14:17:10 np0005481648.novalocal dnf[52040]: delorean-openstack-ironic-python-agent-1492c705 129 kB/s | 3.0 kB 00:00 Oct 12 14:17:10 np0005481648.novalocal dnf[52040]: delorean-openstack-cinder-93d36f446755d2aa40043 132 kB/s | 3.0 kB 00:00 Oct 12 14:17:10 np0005481648.novalocal dnf[52040]: delorean-python-openstackclient-bc1930c20ede201 115 kB/s | 3.0 kB 00:00 Oct 12 14:17:10 np0005481648.novalocal dnf[52040]: delorean-python-observabilityclient-2f31846d73c 135 kB/s | 3.0 kB 00:00 Oct 12 14:17:10 np0005481648.novalocal dnf[52040]: delorean-openstack-kolla-21952c928b6665caa15089 163 kB/s | 3.0 kB 00:00 Oct 12 14:17:10 np0005481648.novalocal dnf[52040]: delorean-openstack-nova-eaaac77eef8efebaff5cec3 138 kB/s | 3.0 kB 00:00 Oct 12 14:17:10 np0005481648.novalocal dnf[52040]: delorean-openstack-designate-239af3482a009fe04a 128 kB/s | 3.0 kB 00:00 Oct 12 14:17:10 np0005481648.novalocal dnf[52040]: delorean-openstack-glance-d70e40e4cc993dacb8833 116 kB/s | 3.0 kB 00:00 Oct 12 14:17:10 np0005481648.novalocal dnf[52040]: delorean-openstack-keystone-0bfe3957e979d226bdf 143 kB/s | 3.0 kB 00:00 Oct 12 14:17:10 np0005481648.novalocal dnf[52040]: delorean-openstack-manila-c7921409a299a7412b88e 142 kB/s | 3.0 kB 00:00 Oct 12 14:17:10 np0005481648.novalocal dnf[52040]: delorean-openstack-neutron-d9269bcf1bae33ecc9b1 165 kB/s | 3.0 kB 00:00 Oct 12 14:17:10 np0005481648.novalocal dnf[52040]: delorean-openstack-octavia-46251e4d6ccad5a750cb 130 kB/s | 3.0 kB 00:00 Oct 12 14:17:10 np0005481648.novalocal dnf[52040]: delorean-openstack-watcher-024815af711553739b46 77 kB/s | 3.0 kB 00:00 Oct 12 14:17:10 np0005481648.novalocal dnf[52040]: delorean-python-tcib-856f39827a406fb012556fd740 159 kB/s | 3.0 kB 00:00 Oct 12 14:17:10 np0005481648.novalocal dnf[52040]: delorean-puppet-ceph-91ba84bc002c318a7f961d084e 150 kB/s | 3.0 kB 00:00 Oct 12 14:17:10 np0005481648.novalocal dnf[52040]: delorean-openstack-swift-2ea8b7ab1a203e53e6976c 139 kB/s | 3.0 kB 00:00 Oct 12 14:17:10 np0005481648.novalocal dnf[52040]: delorean-python-tempestconf-8515371b7cceebd4282 123 kB/s | 3.0 kB 00:00 Oct 12 14:17:10 np0005481648.novalocal dnf[52040]: delorean-openstack-trove-ui-97976e32716770e0c22 135 kB/s | 3.0 kB 00:00 Oct 12 14:17:10 np0005481648.novalocal dnf[52040]: CentOS Stream 9 - BaseOS 877 kB/s | 3.9 kB 00:00 Oct 12 14:17:10 np0005481648.novalocal dnf[52040]: CentOS Stream 9 - AppStream 1.0 MB/s | 4.4 kB 00:00 Oct 12 14:17:10 np0005481648.novalocal dnf[52040]: CentOS Stream 9 - CRB 1.1 MB/s | 4.3 kB 00:00 Oct 12 14:17:11 np0005481648.novalocal dnf[52040]: CentOS Stream 9 - Extras packages 761 kB/s | 3.0 kB 00:00 Oct 12 14:17:11 np0005481648.novalocal dnf[52040]: dlrn-epoxy-testing 162 kB/s | 3.0 kB 00:00 Oct 12 14:17:11 np0005481648.novalocal dnf[52040]: dlrn-epoxy-build-deps 139 kB/s | 3.0 kB 00:00 Oct 12 14:17:11 np0005481648.novalocal dnf[52040]: centos9-rabbitmq 727 kB/s | 3.0 kB 00:00 Oct 12 14:17:11 np0005481648.novalocal dnf[52040]: centos9-storage 825 kB/s | 3.0 kB 00:00 Oct 12 14:17:11 np0005481648.novalocal dnf[52040]: centos9-opstools 852 kB/s | 3.0 kB 00:00 Oct 12 14:17:11 np0005481648.novalocal dnf[52040]: NFV SIG OpenvSwitch 645 kB/s | 3.0 kB 00:00 Oct 12 14:17:11 np0005481648.novalocal dnf[52040]: Extra Packages for Enterprise Linux 9 - x86_64 222 kB/s | 34 kB 00:00 Oct 12 14:17:11 np0005481648.novalocal dnf[52040]: Metadata cache created. Oct 12 14:17:11 np0005481648.novalocal systemd[1]: dnf-makecache.service: Deactivated successfully. Oct 12 14:17:11 np0005481648.novalocal systemd[1]: Finished dnf makecache. Oct 12 14:17:11 np0005481648.novalocal systemd[1]: dnf-makecache.service: Consumed 1.252s CPU time. Oct 12 14:17:19 np0005481648.novalocal dbus-broker-launch[765]: Noticed file-system modification, trigger reload. Oct 12 14:17:19 np0005481648.novalocal dbus-broker-launch[765]: Noticed file-system modification, trigger reload. Oct 12 14:17:22 np0005481648.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 12 14:17:22 np0005481648.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 12 14:17:22 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:17:22 np0005481648.novalocal systemd-rc-local-generator[52309]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:17:22 np0005481648.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 12 14:17:35 np0005481648.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 12 14:17:35 np0005481648.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 12 14:17:35 np0005481648.novalocal systemd[1]: man-db-cache-update.service: Consumed 5.610s CPU time. Oct 12 14:17:35 np0005481648.novalocal systemd[1]: run-rc18695b7fbe1444097c3ae5787be6731.service: Deactivated successfully. Oct 12 14:17:50 np0005481648.novalocal dbus-broker-launch[774]: avc: op=setenforce lsm=selinux enforcing=0 res=1 Oct 12 14:17:50 np0005481648.novalocal systemd[1]: Starting Cleanup of Temporary Directories... Oct 12 14:17:50 np0005481648.novalocal systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Oct 12 14:17:50 np0005481648.novalocal systemd[1]: Finished Cleanup of Temporary Directories. Oct 12 14:17:50 np0005481648.novalocal systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Oct 12 14:18:00 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:18:00 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:18:00 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:18:56 np0005481648.novalocal setsebool[58434]: The virt_use_nfs policy boolean was changed to 1 by root Oct 12 14:18:56 np0005481648.novalocal setsebool[58434]: The virt_sandbox_use_all_caps policy boolean was changed to 1 by root Oct 12 14:19:03 np0005481648.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=4 res=1 Oct 12 14:19:03 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:19:03 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:19:03 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:19:07 np0005481648.novalocal kernel: SELinux: Converting 502 SID table entries... Oct 12 14:19:07 np0005481648.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 12 14:19:07 np0005481648.novalocal kernel: SELinux: policy capability open_perms=1 Oct 12 14:19:07 np0005481648.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 12 14:19:07 np0005481648.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 12 14:19:07 np0005481648.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 12 14:19:07 np0005481648.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 12 14:19:07 np0005481648.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 12 14:20:20 np0005481648.novalocal kernel: SELinux: Converting 2732 SID table entries... Oct 12 14:20:20 np0005481648.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 12 14:20:20 np0005481648.novalocal kernel: SELinux: policy capability open_perms=1 Oct 12 14:20:20 np0005481648.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 12 14:20:20 np0005481648.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 12 14:20:20 np0005481648.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 12 14:20:20 np0005481648.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 12 14:20:20 np0005481648.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 12 14:20:24 np0005481648.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=7 res=1 Oct 12 14:20:24 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:20:24 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:20:24 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:20:57 np0005481648.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 12 14:20:57 np0005481648.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 12 14:20:58 np0005481648.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 12 14:20:58 np0005481648.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 12 14:20:58 np0005481648.novalocal systemd[1]: run-r86a05841700441a58a9100e788ae8eae.service: Deactivated successfully. Oct 12 14:21:03 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:21:03 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:21:03 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:21:10 np0005481648.novalocal kernel: SELinux: Converting 2732 SID table entries... Oct 12 14:21:10 np0005481648.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 12 14:21:10 np0005481648.novalocal kernel: SELinux: policy capability open_perms=1 Oct 12 14:21:10 np0005481648.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 12 14:21:10 np0005481648.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 12 14:21:10 np0005481648.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 12 14:21:10 np0005481648.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 12 14:21:10 np0005481648.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 12 14:21:11 np0005481648.novalocal groupadd[59491]: group added to /etc/group: name=memcached, GID=989 Oct 12 14:21:11 np0005481648.novalocal groupadd[59491]: group added to /etc/gshadow: name=memcached Oct 12 14:21:11 np0005481648.novalocal groupadd[59491]: new group: name=memcached, GID=989 Oct 12 14:21:11 np0005481648.novalocal useradd[59498]: new user: name=memcached, UID=989, GID=989, home=/, shell=/sbin/nologin, from=none Oct 12 14:21:12 np0005481648.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=8 res=1 Oct 12 14:21:12 np0005481648.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 12 14:21:12 np0005481648.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 12 14:21:12 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:21:12 np0005481648.novalocal systemd-rc-local-generator[59932]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:21:12 np0005481648.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 12 14:21:12 np0005481648.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 12 14:21:12 np0005481648.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 12 14:21:12 np0005481648.novalocal systemd[1]: run-r5a69174f4d764cfda41b3b1cdf81abee.service: Deactivated successfully. Oct 12 14:21:13 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:21:13 np0005481648.novalocal systemd-rc-local-generator[60101]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:21:13 np0005481648.novalocal systemd[1]: Started memcached daemon. Oct 12 14:21:13 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:21:13 np0005481648.novalocal systemd-rc-local-generator[60147]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:21:14 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:21:14 np0005481648.novalocal systemd-rc-local-generator[60176]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:21:22 np0005481648.novalocal groupadd[60275]: group added to /etc/group: name=epmd, GID=988 Oct 12 14:21:22 np0005481648.novalocal groupadd[60275]: group added to /etc/gshadow: name=epmd Oct 12 14:21:22 np0005481648.novalocal groupadd[60275]: new group: name=epmd, GID=988 Oct 12 14:21:22 np0005481648.novalocal useradd[60282]: new user: name=epmd, UID=988, GID=988, home=/dev/null, shell=/sbin/nologin, from=none Oct 12 14:21:23 np0005481648.novalocal groupadd[60291]: group added to /etc/group: name=rabbitmq, GID=987 Oct 12 14:21:23 np0005481648.novalocal groupadd[60291]: group added to /etc/gshadow: name=rabbitmq Oct 12 14:21:23 np0005481648.novalocal groupadd[60291]: new group: name=rabbitmq, GID=987 Oct 12 14:21:23 np0005481648.novalocal useradd[60298]: new user: name=rabbitmq, UID=987, GID=987, home=/var/lib/rabbitmq, shell=/sbin/nologin, from=none Oct 12 14:21:24 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:21:24 np0005481648.novalocal systemd-rc-local-generator[60329]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:21:25 np0005481648.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 12 14:21:25 np0005481648.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 12 14:21:25 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:21:25 np0005481648.novalocal systemd-rc-local-generator[60368]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:21:25 np0005481648.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 12 14:21:26 np0005481648.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 12 14:21:26 np0005481648.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 12 14:21:26 np0005481648.novalocal systemd[1]: run-rdfc959c13c5a413d9c9cfe0effe30af1.service: Deactivated successfully. Oct 12 14:21:29 np0005481648.novalocal runuser[61131]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:21:29 np0005481648.novalocal runuser[61131]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:21:45 np0005481648.novalocal kernel: SELinux: Converting 2738 SID table entries... Oct 12 14:21:45 np0005481648.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 12 14:21:45 np0005481648.novalocal kernel: SELinux: policy capability open_perms=1 Oct 12 14:21:45 np0005481648.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 12 14:21:45 np0005481648.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 12 14:21:45 np0005481648.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 12 14:21:45 np0005481648.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 12 14:21:45 np0005481648.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 12 14:21:45 np0005481648.novalocal groupadd[61642]: group added to /etc/group: name=mysql, GID=27 Oct 12 14:21:45 np0005481648.novalocal groupadd[61642]: group added to /etc/gshadow: name=mysql Oct 12 14:21:45 np0005481648.novalocal groupadd[61642]: new group: name=mysql, GID=27 Oct 12 14:21:45 np0005481648.novalocal useradd[61648]: new user: name=mysql, UID=27, GID=27, home=/var/lib/mysql, shell=/sbin/nologin, from=none Oct 12 14:21:47 np0005481648.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=9 res=1 Oct 12 14:21:47 np0005481648.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 12 14:21:47 np0005481648.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 12 14:21:47 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:21:47 np0005481648.novalocal systemd-rc-local-generator[62124]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:21:47 np0005481648.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 12 14:21:52 np0005481648.novalocal groupadd[65474]: group added to /etc/group: name=redis, GID=986 Oct 12 14:21:52 np0005481648.novalocal groupadd[65474]: group added to /etc/gshadow: name=redis Oct 12 14:21:52 np0005481648.novalocal groupadd[65474]: new group: name=redis, GID=986 Oct 12 14:21:52 np0005481648.novalocal useradd[65515]: new user: name=redis, UID=986, GID=986, home=/var/lib/redis, shell=/sbin/nologin, from=none Oct 12 14:21:52 np0005481648.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 12 14:21:52 np0005481648.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 12 14:21:52 np0005481648.novalocal systemd[1]: man-db-cache-update.service: Consumed 5.195s CPU time. Oct 12 14:21:52 np0005481648.novalocal systemd[1]: run-r4fde7371594e4e3baca9e08facf66050.service: Deactivated successfully. Oct 12 14:21:53 np0005481648.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 12 14:21:53 np0005481648.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 12 14:21:53 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:21:53 np0005481648.novalocal systemd-rc-local-generator[65553]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:21:53 np0005481648.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 12 14:21:53 np0005481648.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 12 14:21:53 np0005481648.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 12 14:21:54 np0005481648.novalocal systemd[1]: run-r4e06fae3c0054f0190b3cb7c90b88a0c.service: Deactivated successfully. Oct 12 14:22:06 np0005481648.novalocal kernel: SELinux: Converting 2741 SID table entries... Oct 12 14:22:06 np0005481648.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 12 14:22:06 np0005481648.novalocal kernel: SELinux: policy capability open_perms=1 Oct 12 14:22:06 np0005481648.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 12 14:22:06 np0005481648.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 12 14:22:06 np0005481648.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 12 14:22:06 np0005481648.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 12 14:22:06 np0005481648.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 12 14:22:06 np0005481648.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=10 res=1 Oct 12 14:22:06 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:22:06 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:22:06 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:22:06 np0005481648.novalocal groupadd[65800]: group added to /etc/group: name=unbound, GID=985 Oct 12 14:22:06 np0005481648.novalocal groupadd[65800]: group added to /etc/gshadow: name=unbound Oct 12 14:22:06 np0005481648.novalocal groupadd[65800]: new group: name=unbound, GID=985 Oct 12 14:22:06 np0005481648.novalocal useradd[65807]: new user: name=unbound, UID=985, GID=985, home=/var/lib/unbound, shell=/sbin/nologin, from=none Oct 12 14:22:06 np0005481648.novalocal systemd[1]: Started daily update of the root trust anchor for DNSSEC. Oct 12 14:22:06 np0005481648.novalocal groupadd[65820]: group added to /etc/group: name=openvswitch, GID=984 Oct 12 14:22:06 np0005481648.novalocal groupadd[65820]: group added to /etc/gshadow: name=openvswitch Oct 12 14:22:06 np0005481648.novalocal groupadd[65820]: new group: name=openvswitch, GID=984 Oct 12 14:22:06 np0005481648.novalocal useradd[65827]: new user: name=openvswitch, UID=984, GID=984, home=/, shell=/sbin/nologin, from=none Oct 12 14:22:06 np0005481648.novalocal groupadd[65835]: group added to /etc/group: name=hugetlbfs, GID=983 Oct 12 14:22:06 np0005481648.novalocal groupadd[65835]: group added to /etc/gshadow: name=hugetlbfs Oct 12 14:22:06 np0005481648.novalocal groupadd[65835]: new group: name=hugetlbfs, GID=983 Oct 12 14:22:06 np0005481648.novalocal usermod[65843]: add 'openvswitch' to group 'hugetlbfs' Oct 12 14:22:06 np0005481648.novalocal usermod[65843]: add 'openvswitch' to shadow group 'hugetlbfs' Oct 12 14:22:08 np0005481648.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 12 14:22:08 np0005481648.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 12 14:22:08 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:22:08 np0005481648.novalocal systemd-rc-local-generator[66321]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:22:08 np0005481648.novalocal systemd-sysv-generator[66324]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:22:08 np0005481648.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 12 14:22:09 np0005481648.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 12 14:22:09 np0005481648.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 12 14:22:09 np0005481648.novalocal systemd[1]: run-r098ae1389aaf4352952c860d7e25e0a3.service: Deactivated successfully. Oct 12 14:22:09 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:22:09 np0005481648.novalocal systemd-sysv-generator[66800]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:22:09 np0005481648.novalocal systemd-rc-local-generator[66796]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:22:09 np0005481648.novalocal systemd[1]: Starting Open vSwitch Database Unit... Oct 12 14:22:09 np0005481648.novalocal chown[66808]: /usr/bin/chown: cannot access '/run/openvswitch': No such file or directory Oct 12 14:22:09 np0005481648.novalocal ovs-ctl[66813]: /etc/openvswitch/conf.db does not exist ... (warning). Oct 12 14:22:09 np0005481648.novalocal ovs-ctl[66813]: Creating empty database /etc/openvswitch/conf.db [ OK ] Oct 12 14:22:09 np0005481648.novalocal ovs-ctl[66813]: Starting ovsdb-server [ OK ] Oct 12 14:22:09 np0005481648.novalocal ovs-vsctl[66862]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait -- init -- set Open_vSwitch . db-version=8.8.0 Oct 12 14:22:10 np0005481648.novalocal ovs-vsctl[66881]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait set Open_vSwitch . ovs-version=3.4.4-77.el9s "external-ids:system-id=\"c9d9fccc-60a4-489a-8d09-461de0403b8d\"" "external-ids:rundir=\"/var/run/openvswitch\"" "system-type=\"centos\"" "system-version=\"9\"" Oct 12 14:22:10 np0005481648.novalocal ovs-ctl[66813]: Configuring Open vSwitch system IDs [ OK ] Oct 12 14:22:10 np0005481648.novalocal ovs-vsctl[66886]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005481648 Oct 12 14:22:10 np0005481648.novalocal ovs-ctl[66813]: Enabling remote OVSDB managers [ OK ] Oct 12 14:22:10 np0005481648.novalocal systemd[1]: Started Open vSwitch Database Unit. Oct 12 14:22:10 np0005481648.novalocal systemd[1]: Starting Open vSwitch Delete Transient Ports... Oct 12 14:22:10 np0005481648.novalocal systemd[1]: Finished Open vSwitch Delete Transient Ports. Oct 12 14:22:10 np0005481648.novalocal systemd[1]: Starting Open vSwitch Forwarding Unit... Oct 12 14:22:10 np0005481648.novalocal kernel: openvswitch: Open vSwitch switching datapath Oct 12 14:22:10 np0005481648.novalocal ovs-ctl[66931]: Inserting openvswitch module [ OK ] Oct 12 14:22:10 np0005481648.novalocal ovs-ctl[66900]: Starting ovs-vswitchd [ OK ] Oct 12 14:22:10 np0005481648.novalocal ovs-vsctl[66948]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005481648 Oct 12 14:22:10 np0005481648.novalocal ovs-ctl[66900]: Enabling remote OVSDB managers [ OK ] Oct 12 14:22:10 np0005481648.novalocal systemd[1]: Started Open vSwitch Forwarding Unit. Oct 12 14:22:10 np0005481648.novalocal systemd[1]: Starting Open vSwitch... Oct 12 14:22:10 np0005481648.novalocal systemd[1]: Finished Open vSwitch. Oct 12 14:22:10 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:22:10 np0005481648.novalocal systemd-sysv-generator[66976]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:22:10 np0005481648.novalocal systemd-rc-local-generator[66972]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:22:10 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:22:10 np0005481648.novalocal systemd-sysv-generator[67002]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:22:10 np0005481648.novalocal systemd-rc-local-generator[66999]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:22:10 np0005481648.novalocal ovs-vsctl[67015]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl add-br br-ex Oct 12 14:22:10 np0005481648.novalocal kernel: ovs-system: entered promiscuous mode Oct 12 14:22:10 np0005481648.novalocal NetworkManager[857]: [1760293330.9134] manager: (ovs-system): 'openvswitch' plugin not available; creating generic device Oct 12 14:22:10 np0005481648.novalocal NetworkManager[857]: [1760293330.9150] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/3) Oct 12 14:22:10 np0005481648.novalocal kernel: Timeout policy base is empty Oct 12 14:22:10 np0005481648.novalocal systemd-udevd[66873]: Network interface NamePolicy= disabled on kernel command line. Oct 12 14:22:10 np0005481648.novalocal kernel: br-ex: entered promiscuous mode Oct 12 14:22:10 np0005481648.novalocal NetworkManager[857]: [1760293330.9439] manager: (br-ex): 'openvswitch' plugin not available; creating generic device Oct 12 14:22:10 np0005481648.novalocal NetworkManager[857]: [1760293330.9457] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/4) Oct 12 14:22:10 np0005481648.novalocal NetworkManager[857]: [1760293330.9717] device (br-ex): carrier: link connected Oct 12 14:22:11 np0005481648.novalocal NetworkManager[857]: [1760293331.0104] manager: (loop1): new Dummy device (/org/freedesktop/NetworkManager/Devices/5) Oct 12 14:22:11 np0005481648.novalocal NetworkManager[857]: [1760293331.2485] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=67048 uid=0 result="success" Oct 12 14:22:11 np0005481648.novalocal ifdown[67049]: You are using 'ifdown' script provided by 'network-scripts', which are now deprecated. Oct 12 14:22:11 np0005481648.novalocal ifdown[67050]: 'network-scripts' will be removed from distribution in near future. Oct 12 14:22:11 np0005481648.novalocal ifdown[67051]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 12 14:22:11 np0005481648.novalocal NetworkManager[857]: [1760293331.2847] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=67057 uid=0 result="success" Oct 12 14:22:11 np0005481648.novalocal NetworkManager[857]: [1760293331.3227] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=67065 uid=0 result="success" Oct 12 14:22:11 np0005481648.novalocal NetworkManager[857]: [1760293331.3514] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=67074 uid=0 result="success" Oct 12 14:22:11 np0005481648.novalocal NetworkManager[857]: [1760293331.4207] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=67097 uid=0 result="success" Oct 12 14:22:11 np0005481648.novalocal ovs-vsctl[67102]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-br br-ex Oct 12 14:22:11 np0005481648.novalocal kernel: br-ex: left promiscuous mode Oct 12 14:22:11 np0005481648.novalocal kernel: ovs-system: left promiscuous mode Oct 12 14:22:11 np0005481648.novalocal NetworkManager[857]: [1760293331.5175] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=67122 uid=0 result="success" Oct 12 14:22:11 np0005481648.novalocal ifdown[67126]: You are using 'ifdown' script provided by 'network-scripts', which are now deprecated. Oct 12 14:22:11 np0005481648.novalocal ifdown[67127]: 'network-scripts' will be removed from distribution in near future. Oct 12 14:22:11 np0005481648.novalocal ifdown[67128]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 12 14:22:11 np0005481648.novalocal NetworkManager[857]: [1760293331.5651] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=67134 uid=0 result="success" Oct 12 14:22:11 np0005481648.novalocal NetworkManager[857]: [1760293331.6259] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=67145 uid=0 result="success" Oct 12 14:22:11 np0005481648.novalocal NetworkManager[857]: [1760293331.6672] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=67157 uid=0 result="success" Oct 12 14:22:11 np0005481648.novalocal NetworkManager[857]: [1760293331.7635] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=67183 uid=0 result="success" Oct 12 14:22:11 np0005481648.novalocal ovs-vsctl[67191]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex loop1 Oct 12 14:22:11 np0005481648.novalocal NetworkManager[857]: [1760293331.8389] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=67198 uid=0 result="success" Oct 12 14:22:11 np0005481648.novalocal ifup[67202]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 12 14:22:11 np0005481648.novalocal ifup[67203]: 'network-scripts' will be removed from distribution in near future. Oct 12 14:22:11 np0005481648.novalocal ifup[67204]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 12 14:22:11 np0005481648.novalocal NetworkManager[857]: [1760293331.8833] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=67210 uid=0 result="success" Oct 12 14:22:11 np0005481648.novalocal NetworkManager[857]: [1760293331.9330] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=67222 uid=0 result="success" Oct 12 14:22:11 np0005481648.novalocal ifup[67223]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 12 14:22:11 np0005481648.novalocal ifup[67224]: 'network-scripts' will be removed from distribution in near future. Oct 12 14:22:11 np0005481648.novalocal ifup[67225]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 12 14:22:11 np0005481648.novalocal NetworkManager[857]: [1760293331.9624] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=67231 uid=0 result="success" Oct 12 14:22:11 np0005481648.novalocal ovs-vsctl[67233]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Oct 12 14:22:11 np0005481648.novalocal kernel: ovs-system: entered promiscuous mode Oct 12 14:22:11 np0005481648.novalocal NetworkManager[857]: [1760293331.9840] manager: (ovs-system): 'openvswitch' plugin not available; creating generic device Oct 12 14:22:11 np0005481648.novalocal systemd-udevd[67115]: Network interface NamePolicy= disabled on kernel command line. Oct 12 14:22:11 np0005481648.novalocal NetworkManager[857]: [1760293331.9852] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/6) Oct 12 14:22:11 np0005481648.novalocal kernel: No such timeout policy "ovs_test_tp" Oct 12 14:22:11 np0005481648.novalocal kernel: br-ex: entered promiscuous mode Oct 12 14:22:11 np0005481648.novalocal NetworkManager[857]: [1760293331.9905] manager: (br-ex): 'openvswitch' plugin not available; creating generic device Oct 12 14:22:11 np0005481648.novalocal NetworkManager[857]: [1760293331.9912] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/7) Oct 12 14:22:11 np0005481648.novalocal systemd-udevd[67114]: Network interface NamePolicy= disabled on kernel command line. Oct 12 14:22:12 np0005481648.novalocal NetworkManager[857]: [1760293332.0133] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=67255 uid=0 result="success" Oct 12 14:22:12 np0005481648.novalocal NetworkManager[857]: [1760293332.0379] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=67266 uid=0 result="success" Oct 12 14:22:12 np0005481648.novalocal NetworkManager[857]: [1760293332.0873] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=67284 uid=0 result="success" Oct 12 14:22:12 np0005481648.novalocal ovs-vsctl[67304]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex loop1 -- add-port br-ex loop1 Oct 12 14:22:12 np0005481648.novalocal kernel: loop1: entered promiscuous mode Oct 12 14:22:12 np0005481648.novalocal NetworkManager[857]: [1760293332.1898] device (loop1): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 12 14:22:12 np0005481648.novalocal NetworkManager[857]: [1760293332.1909] device (loop1): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 12 14:22:12 np0005481648.novalocal NetworkManager[857]: [1760293332.2198] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=67311 uid=0 result="success" Oct 12 14:22:12 np0005481648.novalocal ifup[67312]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 12 14:22:12 np0005481648.novalocal ifup[67313]: 'network-scripts' will be removed from distribution in near future. Oct 12 14:22:12 np0005481648.novalocal ifup[67314]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 12 14:22:12 np0005481648.novalocal NetworkManager[857]: [1760293332.2510] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=67320 uid=0 result="success" Oct 12 14:22:12 np0005481648.novalocal ovs-vsctl[67324]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Oct 12 14:22:12 np0005481648.novalocal NetworkManager[857]: [1760293332.3124] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=67331 uid=0 result="success" Oct 12 14:22:12 np0005481648.novalocal ifup[67332]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 12 14:22:12 np0005481648.novalocal ifup[67333]: 'network-scripts' will be removed from distribution in near future. Oct 12 14:22:12 np0005481648.novalocal ifup[67334]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 12 14:22:12 np0005481648.novalocal NetworkManager[857]: [1760293332.3450] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=67340 uid=0 result="success" Oct 12 14:22:12 np0005481648.novalocal ovs-vsctl[67344]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Oct 12 14:22:12 np0005481648.novalocal NetworkManager[857]: [1760293332.3995] device (br-ex): carrier: link connected Oct 12 14:22:14 np0005481648.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 12 14:22:14 np0005481648.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 12 14:22:14 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:22:14 np0005481648.novalocal systemd-rc-local-generator[67416]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:22:14 np0005481648.novalocal systemd-sysv-generator[67420]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:22:14 np0005481648.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 12 14:22:15 np0005481648.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 12 14:22:15 np0005481648.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 12 14:22:15 np0005481648.novalocal systemd[1]: run-r7ab62c2fc1df4a31b4b67a1f2486e826.service: Deactivated successfully. Oct 12 14:22:17 np0005481648.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 12 14:22:17 np0005481648.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 12 14:22:17 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:22:18 np0005481648.novalocal systemd-rc-local-generator[67842]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:22:18 np0005481648.novalocal systemd-sysv-generator[67847]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:22:18 np0005481648.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 12 14:22:18 np0005481648.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 12 14:22:18 np0005481648.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 12 14:22:18 np0005481648.novalocal systemd[1]: run-rea0845f5627943b2bf2b91f00a3e4f3e.service: Deactivated successfully. Oct 12 14:22:19 np0005481648.novalocal ovs-vsctl[67921]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote=ssl:[::1]:6642 Oct 12 14:22:19 np0005481648.novalocal ovs-vsctl[67923]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-type=geneve Oct 12 14:22:19 np0005481648.novalocal ovs-vsctl[67925]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-ip=::1 Oct 12 14:22:19 np0005481648.novalocal ovs-vsctl[67928]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:hostname=np0005481648.novalocal Oct 12 14:22:19 np0005481648.novalocal ovs-vsctl[67930]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge=br-int Oct 12 14:22:19 np0005481648.novalocal ovs-vsctl[67932]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote-probe-interval=60000 Oct 12 14:22:19 np0005481648.novalocal ovs-vsctl[67934]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-monitor-all=false Oct 12 14:22:19 np0005481648.novalocal ovs-vsctl[67936]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-ofctrl-wait-before-clear=8000 Oct 12 14:22:19 np0005481648.novalocal ovs-vsctl[67940]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-cms-options=enable-chassis-as-gw Oct 12 14:22:20 np0005481648.novalocal ovs-vsctl[67944]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge-mappings=external:br-ex Oct 12 14:22:20 np0005481648.novalocal ovs-vsctl[67948]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-match-northd-version=false Oct 12 14:22:34 np0005481648.novalocal groupadd[67970]: group added to /etc/group: name=keystone, GID=163 Oct 12 14:22:34 np0005481648.novalocal groupadd[67970]: group added to /etc/gshadow: name=keystone Oct 12 14:22:34 np0005481648.novalocal groupadd[67970]: new group: name=keystone, GID=163 Oct 12 14:22:34 np0005481648.novalocal useradd[67977]: new user: name=keystone, UID=163, GID=163, home=/var/lib/keystone, shell=/sbin/nologin, from=none Oct 12 14:22:34 np0005481648.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 12 14:22:34 np0005481648.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 12 14:22:36 np0005481648.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 12 14:22:36 np0005481648.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 12 14:22:36 np0005481648.novalocal systemd[1]: run-rf0b623d8e0804bc8a462879ca91e6f23.service: Deactivated successfully. Oct 12 14:22:43 np0005481648.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 12 14:22:43 np0005481648.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 12 14:22:44 np0005481648.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 12 14:22:44 np0005481648.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 12 14:22:44 np0005481648.novalocal systemd[1]: run-r9f71ca3602b747c29b3590ba54b556a2.service: Deactivated successfully. Oct 12 14:22:52 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:22:52 np0005481648.novalocal systemd-sysv-generator[68864]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:22:52 np0005481648.novalocal systemd-rc-local-generator[68858]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:22:52 np0005481648.novalocal systemd[1]: Listening on Device-mapper event daemon FIFOs. Oct 12 14:22:53 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:22:53 np0005481648.novalocal systemd-rc-local-generator[68892]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:22:53 np0005481648.novalocal systemd-sysv-generator[68896]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:22:53 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:22:53 np0005481648.novalocal systemd-rc-local-generator[68922]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:22:53 np0005481648.novalocal systemd-sysv-generator[68925]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:22:53 np0005481648.novalocal systemd-logind[791]: Watching system buttons on /dev/input/event0 (Power Button) Oct 12 14:22:53 np0005481648.novalocal systemd-logind[791]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Oct 12 14:22:56 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:22:56 np0005481648.novalocal systemd-rc-local-generator[69018]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:22:56 np0005481648.novalocal systemd-sysv-generator[69023]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:22:56 np0005481648.novalocal systemd[1]: Starting Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Oct 12 14:22:56 np0005481648.novalocal systemd[1]: Finished Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. Oct 12 14:22:56 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:22:56 np0005481648.novalocal systemd-rc-local-generator[69053]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:22:56 np0005481648.novalocal systemd-sysv-generator[69057]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:22:56 np0005481648.novalocal systemd[1]: Listening on LVM2 poll daemon socket. Oct 12 14:22:59 np0005481648.novalocal groupadd[69070]: group added to /etc/group: name=cinder, GID=165 Oct 12 14:22:59 np0005481648.novalocal groupadd[69070]: group added to /etc/gshadow: name=cinder Oct 12 14:22:59 np0005481648.novalocal groupadd[69070]: new group: name=cinder, GID=165 Oct 12 14:22:59 np0005481648.novalocal useradd[69077]: new user: name=cinder, UID=165, GID=165, home=/var/lib/cinder, shell=/sbin/nologin, from=none Oct 12 14:22:59 np0005481648.novalocal useradd[69077]: add 'cinder' to group 'nobody' Oct 12 14:22:59 np0005481648.novalocal useradd[69077]: add 'cinder' to group 'cinder' Oct 12 14:22:59 np0005481648.novalocal useradd[69077]: add 'cinder' to shadow group 'nobody' Oct 12 14:22:59 np0005481648.novalocal useradd[69077]: add 'cinder' to shadow group 'cinder' Oct 12 14:23:00 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:23:00 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:23:00 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:23:00 np0005481648.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 12 14:23:00 np0005481648.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 12 14:23:00 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:23:00 np0005481648.novalocal systemd-sysv-generator[69126]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:23:00 np0005481648.novalocal systemd-rc-local-generator[69123]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:23:00 np0005481648.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 12 14:23:06 np0005481648.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 12 14:23:06 np0005481648.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 12 14:23:06 np0005481648.novalocal systemd[1]: man-db-cache-update.service: Consumed 2.748s CPU time. Oct 12 14:23:06 np0005481648.novalocal systemd[1]: run-rff6971a1771a4ec291129f9ad6de2ad6.service: Deactivated successfully. Oct 12 14:23:07 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:23:07 np0005481648.novalocal systemd-rc-local-generator[71257]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:23:07 np0005481648.novalocal systemd-sysv-generator[71260]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:23:07 np0005481648.novalocal systemd[1]: One time configuration for iscsi.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/iscsi/initiatorname.iscsi). Oct 12 14:23:07 np0005481648.novalocal systemd[1]: Starting Open-iSCSI... Oct 12 14:23:07 np0005481648.novalocal kernel: Loading iSCSI transport class v2.0-870. Oct 12 14:23:07 np0005481648.novalocal systemd[1]: Started Open-iSCSI. Oct 12 14:23:07 np0005481648.novalocal systemd[1]: Starting Logout off all iSCSI sessions on shutdown... Oct 12 14:23:07 np0005481648.novalocal systemd[1]: Finished Logout off all iSCSI sessions on shutdown. Oct 12 14:23:07 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:23:07 np0005481648.novalocal systemd-sysv-generator[71297]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:23:07 np0005481648.novalocal systemd-rc-local-generator[71293]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:23:07 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:23:07 np0005481648.novalocal systemd-rc-local-generator[71326]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:23:08 np0005481648.novalocal systemd-sysv-generator[71330]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:23:10 np0005481648.novalocal groupadd[71344]: group added to /etc/group: name=glance, GID=161 Oct 12 14:23:10 np0005481648.novalocal groupadd[71344]: group added to /etc/gshadow: name=glance Oct 12 14:23:10 np0005481648.novalocal groupadd[71344]: new group: name=glance, GID=161 Oct 12 14:23:10 np0005481648.novalocal useradd[71351]: new user: name=glance, UID=161, GID=161, home=/var/lib/glance, shell=/sbin/nologin, from=none Oct 12 14:23:11 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:23:11 np0005481648.novalocal systemd-rc-local-generator[71387]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:23:11 np0005481648.novalocal systemd-sysv-generator[71390]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:23:11 np0005481648.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 12 14:23:20 np0005481648.novalocal groupadd[71423]: group added to /etc/group: name=radvd, GID=75 Oct 12 14:23:20 np0005481648.novalocal groupadd[71423]: group added to /etc/gshadow: name=radvd Oct 12 14:23:20 np0005481648.novalocal groupadd[71423]: new group: name=radvd, GID=75 Oct 12 14:23:20 np0005481648.novalocal useradd[71432]: new user: name=radvd, UID=75, GID=75, home=/, shell=/sbin/nologin, from=none Oct 12 14:23:21 np0005481648.novalocal groupadd[71447]: group added to /etc/group: name=haproxy, GID=982 Oct 12 14:23:21 np0005481648.novalocal groupadd[71447]: group added to /etc/gshadow: name=haproxy Oct 12 14:23:21 np0005481648.novalocal groupadd[71447]: new group: name=haproxy, GID=982 Oct 12 14:23:21 np0005481648.novalocal useradd[71454]: new user: name=haproxy, UID=983, GID=982, home=/var/lib/haproxy, shell=/usr/sbin/nologin, from=none Oct 12 14:23:21 np0005481648.novalocal groupadd[71466]: group added to /etc/group: name=dnsmasq, GID=981 Oct 12 14:23:21 np0005481648.novalocal groupadd[71466]: group added to /etc/gshadow: name=dnsmasq Oct 12 14:23:21 np0005481648.novalocal groupadd[71466]: new group: name=dnsmasq, GID=981 Oct 12 14:23:21 np0005481648.novalocal useradd[71473]: new user: name=dnsmasq, UID=982, GID=981, home=/var/lib/dnsmasq, shell=/usr/sbin/nologin, from=none Oct 12 14:23:21 np0005481648.novalocal dbus-broker-launch[765]: Noticed file-system modification, trigger reload. Oct 12 14:23:21 np0005481648.novalocal dbus-broker-launch[765]: Noticed file-system modification, trigger reload. Oct 12 14:23:24 np0005481648.novalocal groupadd[71485]: group added to /etc/group: name=neutron, GID=980 Oct 12 14:23:24 np0005481648.novalocal groupadd[71485]: group added to /etc/gshadow: name=neutron Oct 12 14:23:24 np0005481648.novalocal groupadd[71485]: new group: name=neutron, GID=980 Oct 12 14:23:24 np0005481648.novalocal useradd[71492]: new user: name=neutron, UID=981, GID=980, home=/var/lib/neutron, shell=/sbin/nologin, from=none Oct 12 14:23:26 np0005481648.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 12 14:23:26 np0005481648.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 12 14:23:26 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:23:26 np0005481648.novalocal systemd-rc-local-generator[71540]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:23:26 np0005481648.novalocal systemd-sysv-generator[71544]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:23:26 np0005481648.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 12 14:23:31 np0005481648.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 12 14:23:31 np0005481648.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 12 14:23:31 np0005481648.novalocal systemd[1]: run-r9d773799dcae4012986e42917af2cab0.service: Deactivated successfully. Oct 12 14:23:33 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:23:33 np0005481648.novalocal systemd-sysv-generator[71874]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:23:33 np0005481648.novalocal systemd-rc-local-generator[71867]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:23:33 np0005481648.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 12 14:23:36 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:23:36 np0005481648.novalocal systemd-rc-local-generator[71909]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:23:36 np0005481648.novalocal systemd-sysv-generator[71913]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:23:36 np0005481648.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 12 14:23:41 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:23:41 np0005481648.novalocal systemd-sysv-generator[71957]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:23:41 np0005481648.novalocal systemd-rc-local-generator[71952]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:23:41 np0005481648.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 12 14:23:42 np0005481648.novalocal ovs-vsctl[71968]: ovs|00001|vsctl|INFO|Called as ovs-vsctl set-manager ptcp:6640:127.0.0.1 Oct 12 14:23:45 np0005481648.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 12 14:23:45 np0005481648.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 12 14:23:45 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:23:45 np0005481648.novalocal systemd-sysv-generator[72016]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:23:45 np0005481648.novalocal systemd-rc-local-generator[72012]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:23:45 np0005481648.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 12 14:23:46 np0005481648.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 12 14:23:46 np0005481648.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 12 14:23:46 np0005481648.novalocal systemd[1]: run-r23376cf73a274b69ae251ee00fb1bdfc.service: Deactivated successfully. Oct 12 14:23:48 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:23:48 np0005481648.novalocal systemd-rc-local-generator[72437]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:23:48 np0005481648.novalocal systemd-sysv-generator[72440]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:23:48 np0005481648.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 12 14:23:50 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:23:50 np0005481648.novalocal systemd-rc-local-generator[72481]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:23:50 np0005481648.novalocal systemd-sysv-generator[72484]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:23:51 np0005481648.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 12 14:23:58 np0005481648.novalocal groupadd[72507]: group added to /etc/group: name=placement, GID=979 Oct 12 14:23:58 np0005481648.novalocal groupadd[72507]: group added to /etc/gshadow: name=placement Oct 12 14:23:58 np0005481648.novalocal groupadd[72507]: new group: name=placement, GID=979 Oct 12 14:23:58 np0005481648.novalocal useradd[72514]: new user: name=placement, UID=980, GID=979, home=/, shell=/bin/bash, from=none Oct 12 14:24:05 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:24:05 np0005481648.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 12 14:24:05 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:24:05 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:24:05 np0005481648.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 12 14:24:05 np0005481648.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 12 14:24:05 np0005481648.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 12 14:24:05 np0005481648.novalocal systemd[1]: run-rc8e61d8641f34cefa16b93256509f985.service: Deactivated successfully. Oct 12 14:24:07 np0005481648.novalocal groupadd[72686]: group added to /etc/group: name=nova, GID=162 Oct 12 14:24:07 np0005481648.novalocal groupadd[72686]: group added to /etc/gshadow: name=nova Oct 12 14:24:07 np0005481648.novalocal groupadd[72686]: new group: name=nova, GID=162 Oct 12 14:24:07 np0005481648.novalocal useradd[72693]: new user: name=nova, UID=162, GID=162, home=/var/lib/nova, shell=/sbin/nologin, from=none Oct 12 14:24:07 np0005481648.novalocal useradd[72693]: add 'nova' to group 'nobody' Oct 12 14:24:07 np0005481648.novalocal useradd[72693]: add 'nova' to group 'nova' Oct 12 14:24:07 np0005481648.novalocal useradd[72693]: add 'nova' to shadow group 'nobody' Oct 12 14:24:07 np0005481648.novalocal useradd[72693]: add 'nova' to shadow group 'nova' Oct 12 14:24:27 np0005481648.novalocal kernel: SELinux: Converting 2769 SID table entries... Oct 12 14:24:27 np0005481648.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 12 14:24:27 np0005481648.novalocal kernel: SELinux: policy capability open_perms=1 Oct 12 14:24:27 np0005481648.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 12 14:24:27 np0005481648.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 12 14:24:27 np0005481648.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 12 14:24:27 np0005481648.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 12 14:24:27 np0005481648.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 12 14:24:37 np0005481648.novalocal kernel: SELinux: Converting 2769 SID table entries... Oct 12 14:24:37 np0005481648.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 12 14:24:37 np0005481648.novalocal kernel: SELinux: policy capability open_perms=1 Oct 12 14:24:37 np0005481648.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 12 14:24:37 np0005481648.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 12 14:24:37 np0005481648.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 12 14:24:37 np0005481648.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 12 14:24:37 np0005481648.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 12 14:24:47 np0005481648.novalocal kernel: SELinux: Converting 2769 SID table entries... Oct 12 14:24:47 np0005481648.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 12 14:24:47 np0005481648.novalocal kernel: SELinux: policy capability open_perms=1 Oct 12 14:24:47 np0005481648.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 12 14:24:47 np0005481648.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 12 14:24:47 np0005481648.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 12 14:24:47 np0005481648.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 12 14:24:47 np0005481648.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 12 14:24:57 np0005481648.novalocal kernel: SELinux: Converting 2769 SID table entries... Oct 12 14:24:57 np0005481648.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 12 14:24:57 np0005481648.novalocal kernel: SELinux: policy capability open_perms=1 Oct 12 14:24:57 np0005481648.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 12 14:24:57 np0005481648.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 12 14:24:57 np0005481648.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 12 14:24:57 np0005481648.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 12 14:24:57 np0005481648.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 12 14:25:03 np0005481648.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=14 res=1 Oct 12 14:25:03 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:25:03 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:25:03 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:25:06 np0005481648.novalocal kernel: SELinux: Converting 2769 SID table entries... Oct 12 14:25:06 np0005481648.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 12 14:25:06 np0005481648.novalocal kernel: SELinux: policy capability open_perms=1 Oct 12 14:25:06 np0005481648.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 12 14:25:06 np0005481648.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 12 14:25:06 np0005481648.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 12 14:25:06 np0005481648.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 12 14:25:06 np0005481648.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 12 14:25:18 np0005481648.novalocal kernel: SELinux: Converting 2770 SID table entries... Oct 12 14:25:18 np0005481648.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 12 14:25:18 np0005481648.novalocal kernel: SELinux: policy capability open_perms=1 Oct 12 14:25:18 np0005481648.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 12 14:25:18 np0005481648.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 12 14:25:18 np0005481648.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 12 14:25:18 np0005481648.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 12 14:25:18 np0005481648.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 12 14:25:18 np0005481648.novalocal groupadd[72856]: group added to /etc/group: name=qemu, GID=107 Oct 12 14:25:18 np0005481648.novalocal groupadd[72856]: group added to /etc/gshadow: name=qemu Oct 12 14:25:18 np0005481648.novalocal groupadd[72856]: new group: name=qemu, GID=107 Oct 12 14:25:19 np0005481648.novalocal useradd[72863]: new user: name=qemu, UID=107, GID=107, home=/, shell=/sbin/nologin, from=none Oct 12 14:25:19 np0005481648.novalocal useradd[72863]: add 'qemu' to group 'kvm' Oct 12 14:25:19 np0005481648.novalocal useradd[72863]: add 'qemu' to shadow group 'kvm' Oct 12 14:25:19 np0005481648.novalocal dbus-broker-launch[765]: Noticed file-system modification, trigger reload. Oct 12 14:25:19 np0005481648.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=16 res=1 Oct 12 14:25:19 np0005481648.novalocal dbus-broker-launch[765]: Noticed file-system modification, trigger reload. Oct 12 14:25:19 np0005481648.novalocal dbus-broker-launch[765]: Noticed file-system modification, trigger reload. Oct 12 14:25:20 np0005481648.novalocal groupadd[72901]: group added to /etc/group: name=libvirt, GID=978 Oct 12 14:25:20 np0005481648.novalocal groupadd[72901]: group added to /etc/gshadow: name=libvirt Oct 12 14:25:20 np0005481648.novalocal groupadd[72901]: new group: name=libvirt, GID=978 Oct 12 14:25:20 np0005481648.novalocal polkitd[2933]: Reloading rules Oct 12 14:25:20 np0005481648.novalocal polkitd[2933]: Collecting garbage unconditionally... Oct 12 14:25:20 np0005481648.novalocal polkitd[2933]: Loading rules from directory /etc/polkit-1/rules.d Oct 12 14:25:20 np0005481648.novalocal polkitd[2933]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 12 14:25:20 np0005481648.novalocal polkitd[2933]: Finished loading, compiling and executing 6 rules Oct 12 14:25:20 np0005481648.novalocal polkitd[2933]: Reloading rules Oct 12 14:25:20 np0005481648.novalocal polkitd[2933]: Collecting garbage unconditionally... Oct 12 14:25:20 np0005481648.novalocal polkitd[2933]: Loading rules from directory /etc/polkit-1/rules.d Oct 12 14:25:20 np0005481648.novalocal polkitd[2933]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 12 14:25:20 np0005481648.novalocal polkitd[2933]: Finished loading, compiling and executing 6 rules Oct 12 14:25:24 np0005481648.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 12 14:25:24 np0005481648.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 12 14:25:24 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:25:24 np0005481648.novalocal systemd-sysv-generator[73611]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:25:24 np0005481648.novalocal systemd-rc-local-generator[73608]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:25:24 np0005481648.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 12 14:25:28 np0005481648.novalocal groupadd[77113]: group added to /etc/group: name=octavia, GID=977 Oct 12 14:25:28 np0005481648.novalocal groupadd[77113]: group added to /etc/gshadow: name=octavia Oct 12 14:25:28 np0005481648.novalocal groupadd[77113]: new group: name=octavia, GID=977 Oct 12 14:25:28 np0005481648.novalocal useradd[77142]: new user: name=octavia, UID=979, GID=977, home=/var/lib/octavia, shell=/sbin/nologin, from=none Oct 12 14:25:29 np0005481648.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 12 14:25:29 np0005481648.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 12 14:25:29 np0005481648.novalocal systemd[1]: man-db-cache-update.service: Consumed 5.306s CPU time. Oct 12 14:25:29 np0005481648.novalocal systemd[1]: run-r6c98bbdb22934f95b2f9c1bcb9bbe741.service: Deactivated successfully. Oct 12 14:25:34 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:25:34 np0005481648.novalocal systemd-rc-local-generator[77331]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:25:34 np0005481648.novalocal systemd-sysv-generator[77334]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:25:34 np0005481648.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 12 14:25:39 np0005481648.novalocal sshd-session[77350]: Connection closed by 209.38.110.19 port 40242 Oct 12 14:25:40 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:25:40 np0005481648.novalocal systemd-rc-local-generator[77375]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:25:40 np0005481648.novalocal systemd-sysv-generator[77380]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:25:40 np0005481648.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 12 14:25:43 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:25:43 np0005481648.novalocal systemd-rc-local-generator[77417]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:25:43 np0005481648.novalocal systemd-sysv-generator[77422]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:25:43 np0005481648.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 12 14:25:46 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:25:46 np0005481648.novalocal systemd-rc-local-generator[77459]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:25:46 np0005481648.novalocal systemd-sysv-generator[77462]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:25:46 np0005481648.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 12 14:25:48 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:25:49 np0005481648.novalocal systemd-sysv-generator[77502]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:25:49 np0005481648.novalocal systemd-rc-local-generator[77499]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:25:49 np0005481648.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 12 14:26:01 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:26:01 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:26:01 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:26:01 np0005481648.novalocal groupadd[77531]: group added to /etc/group: name=apache, GID=48 Oct 12 14:26:01 np0005481648.novalocal groupadd[77531]: group added to /etc/gshadow: name=apache Oct 12 14:26:01 np0005481648.novalocal groupadd[77531]: new group: name=apache, GID=48 Oct 12 14:26:01 np0005481648.novalocal useradd[77540]: new user: name=apache, UID=48, GID=48, home=/usr/share/httpd, shell=/sbin/nologin, from=none Oct 12 14:26:05 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:26:06 np0005481648.novalocal systemd-rc-local-generator[77575]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:26:06 np0005481648.novalocal systemd-sysv-generator[77578]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:26:06 np0005481648.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 12 14:26:06 np0005481648.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 12 14:26:07 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:26:07 np0005481648.novalocal systemd-rc-local-generator[77644]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:26:07 np0005481648.novalocal systemd-sysv-generator[77648]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:26:07 np0005481648.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 12 14:26:12 np0005481648.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 12 14:26:12 np0005481648.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 12 14:26:12 np0005481648.novalocal systemd[1]: run-r0936261a5dcc4251a94cfaaf5a0e97eb.service: Deactivated successfully. Oct 12 14:26:18 np0005481648.novalocal groupadd[77947]: group added to /etc/group: name=manila, GID=976 Oct 12 14:26:19 np0005481648.novalocal groupadd[77947]: group added to /etc/gshadow: name=manila Oct 12 14:26:19 np0005481648.novalocal groupadd[77947]: new group: name=manila, GID=976 Oct 12 14:26:19 np0005481648.novalocal useradd[77954]: new user: name=manila, UID=978, GID=976, home=/var/lib/manila, shell=/sbin/nologin, from=none Oct 12 14:26:19 np0005481648.novalocal useradd[77954]: add 'manila' to group 'nobody' Oct 12 14:26:19 np0005481648.novalocal useradd[77954]: add 'manila' to group 'manila' Oct 12 14:26:19 np0005481648.novalocal useradd[77954]: add 'manila' to shadow group 'nobody' Oct 12 14:26:19 np0005481648.novalocal useradd[77954]: add 'manila' to shadow group 'manila' Oct 12 14:26:20 np0005481648.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 12 14:26:20 np0005481648.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 12 14:26:20 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:26:20 np0005481648.novalocal systemd-rc-local-generator[77997]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:26:20 np0005481648.novalocal systemd-sysv-generator[78000]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:26:20 np0005481648.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 12 14:26:21 np0005481648.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 12 14:26:21 np0005481648.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 12 14:26:21 np0005481648.novalocal systemd[1]: run-rab9a1842fffc44758e27284b53798060.service: Deactivated successfully. Oct 12 14:26:24 np0005481648.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 12 14:26:24 np0005481648.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 12 14:26:24 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:26:24 np0005481648.novalocal systemd-rc-local-generator[78208]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:26:24 np0005481648.novalocal systemd-sysv-generator[78213]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:26:25 np0005481648.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 12 14:26:25 np0005481648.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 12 14:26:25 np0005481648.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 12 14:26:25 np0005481648.novalocal systemd[1]: run-r591ddb3f4d4845599cd79e91c1a2592a.service: Deactivated successfully. Oct 12 14:26:26 np0005481648.novalocal kernel: loop: module loaded Oct 12 14:26:26 np0005481648.novalocal kernel: loop3: detected capacity change from 0 to 31457280 Oct 12 14:26:26 np0005481648.novalocal lvm[78651]: PV /dev/loop3 not used. Oct 12 14:26:27 np0005481648.novalocal lvm[78654]: PV /dev/loop3 online, VG lvm-shares is complete. Oct 12 14:26:27 np0005481648.novalocal systemd[1]: Started /usr/sbin/lvm vgchange -aay --autoactivation event lvm-shares. Oct 12 14:26:27 np0005481648.novalocal lvm[78656]: 0 logical volume(s) in volume group "lvm-shares" now active Oct 12 14:26:27 np0005481648.novalocal systemd[1]: lvm-activate-lvm-shares.service: Deactivated successfully. Oct 12 14:26:44 np0005481648.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 12 14:26:44 np0005481648.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 12 14:26:45 np0005481648.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 12 14:26:45 np0005481648.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 12 14:26:45 np0005481648.novalocal systemd[1]: run-r26349ef9511447d5bd176ac9d8b900e5.service: Deactivated successfully. Oct 12 14:26:54 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:26:54 np0005481648.novalocal systemd-rc-local-generator[78957]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:26:54 np0005481648.novalocal systemd-sysv-generator[78960]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:26:54 np0005481648.novalocal systemd[1]: Starting MariaDB 10.5 database server... Oct 12 14:26:54 np0005481648.novalocal mariadb-prepare-db-dir[78988]: Database MariaDB is probably initialized in /var/lib/mysql already, nothing is done. Oct 12 14:26:54 np0005481648.novalocal mariadb-prepare-db-dir[78988]: If this is not the case, make sure the /var/lib/mysql is empty before running mariadb-prepare-db-dir. Oct 12 14:26:54 np0005481648.novalocal systemd[1]: Started MariaDB 10.5 database server. Oct 12 14:26:54 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:26:54 np0005481648.novalocal systemd-rc-local-generator[79097]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:26:54 np0005481648.novalocal systemd-sysv-generator[79100]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:26:55 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:26:55 np0005481648.novalocal systemd-sysv-generator[79131]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:26:55 np0005481648.novalocal systemd-rc-local-generator[79127]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:26:55 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:26:55 np0005481648.novalocal systemd-rc-local-generator[79165]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:26:55 np0005481648.novalocal systemd-sysv-generator[79169]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:26:56 np0005481648.novalocal systemd[1]: Starting Redis persistent key-value database... Oct 12 14:26:56 np0005481648.novalocal systemd[1]: Started Redis persistent key-value database. Oct 12 14:26:56 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:26:56 np0005481648.novalocal systemd-rc-local-generator[79199]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:26:56 np0005481648.novalocal systemd-sysv-generator[79202]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:26:56 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:26:56 np0005481648.novalocal systemd-rc-local-generator[79228]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:26:56 np0005481648.novalocal systemd-sysv-generator[79233]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:26:56 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:26:56 np0005481648.novalocal systemd-rc-local-generator[79261]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:26:56 np0005481648.novalocal systemd-sysv-generator[79265]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:26:57 np0005481648.novalocal systemd[1]: Starting Redis Sentinel... Oct 12 14:26:57 np0005481648.novalocal systemd[1]: Started Redis Sentinel. Oct 12 14:26:57 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:26:57 np0005481648.novalocal systemd-rc-local-generator[79293]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:26:57 np0005481648.novalocal systemd-sysv-generator[79297]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:26:57 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:26:57 np0005481648.novalocal systemd-rc-local-generator[79325]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:26:57 np0005481648.novalocal systemd-sysv-generator[79330]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:26:58 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:26:58 np0005481648.novalocal systemd-sysv-generator[79409]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:26:58 np0005481648.novalocal systemd-rc-local-generator[79405]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:26:58 np0005481648.novalocal systemd[1]: Starting OVN northd management daemon... Oct 12 14:26:58 np0005481648.novalocal chown[79415]: /usr/bin/chown: cannot access '/var/lib/ovn': No such file or directory Oct 12 14:26:58 np0005481648.novalocal ovn-ctl[79416]: /var/lib/ovn/ovnnb_db.db does not exist ... (warning). Oct 12 14:26:58 np0005481648.novalocal ovn-ctl[79416]: Creating empty database /var/lib/ovn/ovnnb_db.db [ OK ] Oct 12 14:26:58 np0005481648.novalocal ovsdb-server[79518]: ovs|00001|vlog|INFO|opened log file /var/log/ovn/ovsdb-server-nb.log Oct 12 14:26:58 np0005481648.novalocal ovsdb-server[79520]: ovs|00002|ovsdb_server|INFO|ovsdb-server (Open vSwitch) 3.4.4-77.el9s Oct 12 14:26:58 np0005481648.novalocal ovsdb-server[79519]: ovs|00002|vlog(monitor)|INFO|closing log file Oct 12 14:26:58 np0005481648.novalocal ovsdb-server[79519]: ovs|00003|vlog(monitor)|INFO|opened log file (null) Oct 12 14:26:58 np0005481648.novalocal ovn-ctl[79416]: Starting ovsdb-nb [ OK ] Oct 12 14:26:58 np0005481648.novalocal ovn-nbctl[79524]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl --no-leader-only --db=unix:/run/ovn/ovnnb_db.sock init Oct 12 14:26:58 np0005481648.novalocal ovn-ctl[79416]: /var/lib/ovn/ovnsb_db.db does not exist ... (warning). Oct 12 14:26:58 np0005481648.novalocal ovn-ctl[79416]: Creating empty database /var/lib/ovn/ovnsb_db.db [ OK ] Oct 12 14:26:58 np0005481648.novalocal ovsdb-server[79544]: ovs|00001|vlog|INFO|opened log file /var/log/ovn/ovsdb-server-sb.log Oct 12 14:26:58 np0005481648.novalocal ovsdb-server[79546]: ovs|00002|ovsdb_server|INFO|ovsdb-server (Open vSwitch) 3.4.4-77.el9s Oct 12 14:26:58 np0005481648.novalocal ovsdb-server[79545]: ovs|00002|vlog(monitor)|INFO|closing log file Oct 12 14:26:58 np0005481648.novalocal ovsdb-server[79545]: ovs|00003|vlog(monitor)|INFO|opened log file (null) Oct 12 14:26:58 np0005481648.novalocal ovn-ctl[79416]: Starting ovsdb-sb [ OK ] Oct 12 14:26:58 np0005481648.novalocal ovn-sbctl[79550]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl --no-leader-only --db=unix:/run/ovn/ovnsb_db.sock init Oct 12 14:26:59 np0005481648.novalocal ovn-ctl[79416]: Starting ovn-northd [ OK ] Oct 12 14:26:59 np0005481648.novalocal systemd[1]: Finished OVN northd management daemon. Oct 12 14:26:59 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:26:59 np0005481648.novalocal systemd-rc-local-generator[79588]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:26:59 np0005481648.novalocal systemd-sysv-generator[79592]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:26:59 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:26:59 np0005481648.novalocal systemd-rc-local-generator[79617]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:26:59 np0005481648.novalocal systemd-sysv-generator[79620]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:26:59 np0005481648.novalocal ovn-nbctl[79628]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl set-connection pssl:6641:[::1] Oct 12 14:26:59 np0005481648.novalocal ovn-sbctl[79632]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl set-connection pssl:6642:[::1] Oct 12 14:26:59 np0005481648.novalocal sudo[79634]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get connection . inactivity_probe Oct 12 14:26:59 np0005481648.novalocal sudo[79634]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:26:59 np0005481648.novalocal sudo[79634]: pam_unix(sudo:session): session closed for user root Oct 12 14:26:59 np0005481648.novalocal ovn-nbctl[79637]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl set connection . inactivity_probe=0 Oct 12 14:26:59 np0005481648.novalocal sudo[79639]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get connection . inactivity_probe Oct 12 14:26:59 np0005481648.novalocal sudo[79639]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:26:59 np0005481648.novalocal sudo[79639]: pam_unix(sudo:session): session closed for user root Oct 12 14:26:59 np0005481648.novalocal ovn-sbctl[79642]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl set connection . inactivity_probe=0 Oct 12 14:27:00 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:27:00 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:27:00 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:27:00 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:27:00 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:27:00 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:27:00 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:27:00 np0005481648.novalocal systemd-sysv-generator[79691]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:27:00 np0005481648.novalocal systemd-rc-local-generator[79687]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:27:00 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:27:00 np0005481648.novalocal systemd[1]: Starting OVN controller daemon... Oct 12 14:27:00 np0005481648.novalocal ovn-ctl[79701]: Starting ovn-controller [ OK ] Oct 12 14:27:00 np0005481648.novalocal systemd[1]: Started OVN controller daemon. Oct 12 14:27:00 np0005481648.novalocal kernel: br-int: entered promiscuous mode Oct 12 14:27:00 np0005481648.novalocal NetworkManager[857]: [1760293620.8180] manager: (br-int): 'openvswitch' plugin not available; creating generic device Oct 12 14:27:00 np0005481648.novalocal NetworkManager[857]: [1760293620.8200] manager: (br-int): new Generic device (/org/freedesktop/NetworkManager/Devices/8) Oct 12 14:27:00 np0005481648.novalocal systemd-udevd[79758]: Network interface NamePolicy= disabled on kernel command line. Oct 12 14:27:00 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:27:00 np0005481648.novalocal systemd-rc-local-generator[79781]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:27:00 np0005481648.novalocal systemd-sysv-generator[79785]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:27:01 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:27:01 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:27:01 np0005481648.novalocal systemd-rc-local-generator[79808]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:27:01 np0005481648.novalocal systemd-sysv-generator[79814]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:27:01 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:27:02 np0005481648.novalocal kernel: SELinux: Converting 2795 SID table entries... Oct 12 14:27:02 np0005481648.novalocal kernel: SELinux: policy capability network_peer_controls=1 Oct 12 14:27:02 np0005481648.novalocal kernel: SELinux: policy capability open_perms=1 Oct 12 14:27:02 np0005481648.novalocal kernel: SELinux: policy capability extended_socket_class=1 Oct 12 14:27:02 np0005481648.novalocal kernel: SELinux: policy capability always_check_network=0 Oct 12 14:27:02 np0005481648.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Oct 12 14:27:02 np0005481648.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 12 14:27:02 np0005481648.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 12 14:27:02 np0005481648.novalocal setsebool[79821]: The os_neutron_dac_override policy boolean was changed to on by root Oct 12 14:27:05 np0005481648.novalocal kernel: loop2: detected capacity change from 0 to 31457280 Oct 12 14:27:05 np0005481648.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=18 res=1 Oct 12 14:27:05 np0005481648.novalocal lvm[79841]: PV /dev/loop2 not used. Oct 12 14:27:05 np0005481648.novalocal lvm[79844]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 12 14:27:05 np0005481648.novalocal systemd[1]: Started /usr/sbin/lvm vgchange -aay --autoactivation event cinder-volumes. Oct 12 14:27:05 np0005481648.novalocal lvm[79846]: 0 logical volume(s) in volume group "cinder-volumes" now active Oct 12 14:27:05 np0005481648.novalocal systemd[1]: lvm-activate-cinder-volumes.service: Deactivated successfully. Oct 12 14:27:08 np0005481648.novalocal ovsdb-server[79520]: ovs|00003|memory|INFO|10496 kB peak resident set size after 10.1 seconds Oct 12 14:27:08 np0005481648.novalocal ovsdb-server[79520]: ovs|00004|memory|INFO|atoms:44 cells:43 json-caches:1 monitors:2 n-weak-refs:0 sessions:1 Oct 12 14:27:09 np0005481648.novalocal ovsdb-server[79546]: ovs|00003|memory|INFO|11136 kB peak resident set size after 10.1 seconds Oct 12 14:27:09 np0005481648.novalocal ovsdb-server[79546]: ovs|00004|memory|INFO|atoms:451 cells:355 json-caches:1 monitors:3 n-weak-refs:11 sessions:2 Oct 12 14:27:17 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:27:17 np0005481648.novalocal systemd-sysv-generator[79888]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:27:17 np0005481648.novalocal systemd-rc-local-generator[79885]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:27:17 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:27:17 np0005481648.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 12 14:27:19 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:27:19 np0005481648.novalocal systemd-rc-local-generator[79924]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:27:19 np0005481648.novalocal systemd-sysv-generator[79928]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:27:20 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:27:20 np0005481648.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 12 14:27:25 np0005481648.novalocal groupadd[79994]: group added to /etc/group: name=clevis, GID=975 Oct 12 14:27:25 np0005481648.novalocal groupadd[79994]: group added to /etc/gshadow: name=clevis Oct 12 14:27:25 np0005481648.novalocal groupadd[79994]: new group: name=clevis, GID=975 Oct 12 14:27:25 np0005481648.novalocal useradd[80001]: new user: name=clevis, UID=977, GID=975, home=/var/cache/clevis, shell=/usr/sbin/nologin, from=none Oct 12 14:27:25 np0005481648.novalocal usermod[80011]: add 'clevis' to group 'tss' Oct 12 14:27:25 np0005481648.novalocal usermod[80011]: add 'clevis' to shadow group 'tss' Oct 12 14:27:25 np0005481648.novalocal usermod[80024]: add 'nova' to group 'qemu' Oct 12 14:27:25 np0005481648.novalocal usermod[80024]: add 'nova' to shadow group 'qemu' Oct 12 14:27:25 np0005481648.novalocal usermod[80031]: add 'nova' to group 'libvirt' Oct 12 14:27:25 np0005481648.novalocal usermod[80031]: add 'nova' to shadow group 'libvirt' Oct 12 14:27:26 np0005481648.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 12 14:27:26 np0005481648.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 12 14:27:26 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:27:26 np0005481648.novalocal systemd-sysv-generator[80113]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:27:26 np0005481648.novalocal systemd-rc-local-generator[80109]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:27:27 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:27:27 np0005481648.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 12 14:27:29 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:27:30 np0005481648.novalocal systemd-rc-local-generator[82582]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:27:30 np0005481648.novalocal systemd-sysv-generator[82587]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:27:30 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:27:30 np0005481648.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 12 14:27:31 np0005481648.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 12 14:27:31 np0005481648.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 12 14:27:31 np0005481648.novalocal systemd[1]: man-db-cache-update.service: Consumed 5.837s CPU time. Oct 12 14:27:31 np0005481648.novalocal systemd[1]: run-r6e44f9a43daa4ddfb1f0564d8c6b865a.service: Deactivated successfully. Oct 12 14:27:33 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:27:33 np0005481648.novalocal systemd-sysv-generator[84022]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:27:33 np0005481648.novalocal systemd-rc-local-generator[84017]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:27:33 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:27:33 np0005481648.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 12 14:27:36 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:27:36 np0005481648.novalocal systemd-rc-local-generator[84049]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:27:36 np0005481648.novalocal systemd-sysv-generator[84053]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:27:36 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:27:59 np0005481648.novalocal crontab[84108]: (root) LIST (root) Oct 12 14:27:59 np0005481648.novalocal crontab[84109]: (root) LIST (keystone) Oct 12 14:27:59 np0005481648.novalocal crontab[84110]: (root) LIST (cinder) Oct 12 14:27:59 np0005481648.novalocal crontab[84111]: (root) LIST (glance) Oct 12 14:27:59 np0005481648.novalocal crontab[84112]: (root) LIST (nova) Oct 12 14:27:59 np0005481648.novalocal crontab[84113]: (root) LIST (manila) Oct 12 14:27:59 np0005481648.novalocal crontab[84114]: (root) REPLACE (cinder) Oct 12 14:27:59 np0005481648.novalocal crontab[84115]: (root) REPLACE (glance) Oct 12 14:28:00 np0005481648.novalocal crontab[84116]: (root) REPLACE (glance) Oct 12 14:28:00 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:28:00 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:28:00 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:28:05 np0005481648.novalocal crontab[84132]: (root) REPLACE (glance) Oct 12 14:28:05 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:28:05 np0005481648.novalocal systemd-rc-local-generator[84151]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:28:05 np0005481648.novalocal systemd-sysv-generator[84155]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:28:05 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:28:39 np0005481648.novalocal crontab[84221]: (root) REPLACE (nova) Oct 12 14:28:47 np0005481648.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 12 14:28:47 np0005481648.novalocal systemd[1]: Starting man-db-cache-update.service... Oct 12 14:28:47 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:28:47 np0005481648.novalocal systemd-rc-local-generator[84267]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:28:47 np0005481648.novalocal systemd-sysv-generator[84270]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:28:47 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:28:47 np0005481648.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Oct 12 14:28:48 np0005481648.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 12 14:28:48 np0005481648.novalocal systemd[1]: Finished man-db-cache-update.service. Oct 12 14:28:48 np0005481648.novalocal systemd[1]: run-rcd1e74337eb74eb5a84ac8c9ea60d30a.service: Deactivated successfully. Oct 12 14:28:58 np0005481648.novalocal crontab[84371]: (root) REPLACE (manila) Oct 12 14:28:58 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:28:58 np0005481648.novalocal systemd-sysv-generator[84392]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:28:58 np0005481648.novalocal systemd-rc-local-generator[84388]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:28:58 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:28:58 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:28:58 np0005481648.novalocal systemd-rc-local-generator[84425]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:28:58 np0005481648.novalocal systemd-sysv-generator[84428]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:28:59 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:28:59 np0005481648.novalocal systemd[84434]: epmd.socket: Failed to create listening socket ([::]:4369): Address already in use Oct 12 14:28:59 np0005481648.novalocal systemd[1]: epmd.socket: Failed to receive listening socket ([::]:4369): Input/output error Oct 12 14:28:59 np0005481648.novalocal systemd[1]: epmd.socket: Failed to listen on sockets: Input/output error Oct 12 14:28:59 np0005481648.novalocal systemd[1]: epmd.socket: Failed with result 'resources'. Oct 12 14:28:59 np0005481648.novalocal systemd[1]: Failed to listen on Erlang Port Mapper Daemon Activation Socket. Oct 12 14:28:59 np0005481648.novalocal systemd[1]: Starting RabbitMQ broker... Oct 12 14:28:59 np0005481648.novalocal rabbitmq-server[84435]: 2025-10-12 14:28:59.726604-04:00 [warning] <0.129.0> Both old (.config) and new (.conf) format config files exist. Oct 12 14:28:59 np0005481648.novalocal rabbitmq-server[84435]: 2025-10-12 14:28:59.738404-04:00 [warning] <0.129.0> Using the old format config file: /etc/rabbitmq/rabbitmq.config Oct 12 14:28:59 np0005481648.novalocal rabbitmq-server[84435]: 2025-10-12 14:28:59.738453-04:00 [warning] <0.129.0> Please update your config files to the new format and remove the old file. Oct 12 14:29:00 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:29:00 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:29:00 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:29:01 np0005481648.novalocal crond[1006]: (glance) RELOAD (/var/spool/cron/glance) Oct 12 14:29:01 np0005481648.novalocal rabbitmq-server[84435]: 2025-10-12 14:29:01.332189-04:00 [info] <0.229.0> Feature flags: list of feature flags found: Oct 12 14:29:01 np0005481648.novalocal rabbitmq-server[84435]: 2025-10-12 14:29:01.332268-04:00 [info] <0.229.0> Feature flags: [ ] implicit_default_bindings Oct 12 14:29:01 np0005481648.novalocal rabbitmq-server[84435]: 2025-10-12 14:29:01.332293-04:00 [info] <0.229.0> Feature flags: [ ] maintenance_mode_status Oct 12 14:29:01 np0005481648.novalocal rabbitmq-server[84435]: 2025-10-12 14:29:01.332322-04:00 [info] <0.229.0> Feature flags: [ ] quorum_queue Oct 12 14:29:01 np0005481648.novalocal rabbitmq-server[84435]: 2025-10-12 14:29:01.332388-04:00 [info] <0.229.0> Feature flags: [ ] stream_queue Oct 12 14:29:01 np0005481648.novalocal rabbitmq-server[84435]: 2025-10-12 14:29:01.332407-04:00 [info] <0.229.0> Feature flags: [ ] user_limits Oct 12 14:29:01 np0005481648.novalocal rabbitmq-server[84435]: 2025-10-12 14:29:01.332426-04:00 [info] <0.229.0> Feature flags: [ ] virtual_host_metadata Oct 12 14:29:01 np0005481648.novalocal rabbitmq-server[84435]: 2025-10-12 14:29:01.332481-04:00 [info] <0.229.0> Feature flags: feature flag states written to disk: yes Oct 12 14:29:01 np0005481648.novalocal rabbitmq-server[84435]: 2025-10-12 14:29:01.622496-04:00 [notice] <0.44.0> Application syslog exited with reason: stopped Oct 12 14:29:01 np0005481648.novalocal rabbitmq-server[84435]: 2025-10-12 14:29:01.622602-04:00 [notice] <0.229.0> Logging: switching to configured handler(s); following messages may not be visible in this log output Oct 12 14:29:01 np0005481648.novalocal rabbitmq-server[84435]: ## ## RabbitMQ 3.9.21 Oct 12 14:29:01 np0005481648.novalocal rabbitmq-server[84435]: ## ## Oct 12 14:29:01 np0005481648.novalocal rabbitmq-server[84435]: ########## Copyright (c) 2007-2022 VMware, Inc. or its affiliates. Oct 12 14:29:01 np0005481648.novalocal rabbitmq-server[84435]: ###### ## Oct 12 14:29:01 np0005481648.novalocal rabbitmq-server[84435]: ########## Licensed under the MPL 2.0. Website: https://rabbitmq.com Oct 12 14:29:01 np0005481648.novalocal rabbitmq-server[84435]: Erlang: 24.3.4.2 [jit] Oct 12 14:29:01 np0005481648.novalocal rabbitmq-server[84435]: TLS Library: OpenSSL - OpenSSL 3.5.1 1 Jul 2025 Oct 12 14:29:01 np0005481648.novalocal rabbitmq-server[84435]: Doc guides: https://rabbitmq.com/documentation.html Oct 12 14:29:01 np0005481648.novalocal rabbitmq-server[84435]: Support: https://rabbitmq.com/contact.html Oct 12 14:29:01 np0005481648.novalocal rabbitmq-server[84435]: Tutorials: https://rabbitmq.com/getstarted.html Oct 12 14:29:01 np0005481648.novalocal rabbitmq-server[84435]: Monitoring: https://rabbitmq.com/monitoring.html Oct 12 14:29:01 np0005481648.novalocal rabbitmq-server[84435]: Logs: /var/log/rabbitmq/rabbit@localhost6.log Oct 12 14:29:01 np0005481648.novalocal rabbitmq-server[84435]: /var/log/rabbitmq/rabbit@localhost6_upgrade.log Oct 12 14:29:01 np0005481648.novalocal rabbitmq-server[84435]: Oct 12 14:29:01 np0005481648.novalocal rabbitmq-server[84435]: Config file(s): /etc/rabbitmq/rabbitmq.config Oct 12 14:29:04 np0005481648.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 12 14:29:04 np0005481648.novalocal rabbitmq-server[84435]: Starting broker... completed with 3 plugins. Oct 12 14:29:04 np0005481648.novalocal systemd[1]: Started RabbitMQ broker. Oct 12 14:29:04 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:05 np0005481648.novalocal systemd-rc-local-generator[84542]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:05 np0005481648.novalocal systemd-sysv-generator[84547]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:05 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:05 np0005481648.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 12 14:29:05 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:05 np0005481648.novalocal systemd-rc-local-generator[84572]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:05 np0005481648.novalocal systemd-sysv-generator[84575]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:05 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:05 np0005481648.novalocal runuser[84583]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:29:05 np0005481648.novalocal setroubleshoot[84519]: failed to retrieve rpm info for path '/proc/net/if_inet6': Oct 12 14:29:05 np0005481648.novalocal systemd[1]: Created slice Slice /system/dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged. Oct 12 14:29:05 np0005481648.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service. Oct 12 14:29:06 np0005481648.novalocal runuser[84583]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:29:06 np0005481648.novalocal runuser[84646]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:29:06 np0005481648.novalocal setroubleshoot[84519]: SELinux is preventing /usr/lib64/erlang/erts-12.3.2.2/bin/inet_gethost from read access on the lnk_file /proc/net/if_inet6. For complete SELinux messages run: sealert -l 1fd2a001-d780-4a7a-9434-a55bd3b6f43d Oct 12 14:29:06 np0005481648.novalocal setroubleshoot[84519]: SELinux is preventing /usr/lib64/erlang/erts-12.3.2.2/bin/inet_gethost from read access on the lnk_file /proc/net/if_inet6. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that inet_gethost should be allowed read access on the if_inet6 lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'inet_gethost' --raw | audit2allow -M my-inetgethost # semodule -X 300 -i my-inetgethost.pp Oct 12 14:29:07 np0005481648.novalocal runuser[84646]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:29:07 np0005481648.novalocal runuser[84699]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:29:07 np0005481648.novalocal runuser[84699]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:29:07 np0005481648.novalocal runuser[84753]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:29:08 np0005481648.novalocal runuser[84753]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:29:08 np0005481648.novalocal runuser[84807]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:29:09 np0005481648.novalocal runuser[84807]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:29:09 np0005481648.novalocal runuser[84859]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:29:09 np0005481648.novalocal runuser[84859]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:29:09 np0005481648.novalocal runuser[84911]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:29:10 np0005481648.novalocal runuser[84911]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:29:10 np0005481648.novalocal runuser[84963]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:29:11 np0005481648.novalocal runuser[84963]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:29:11 np0005481648.novalocal runuser[85015]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:29:11 np0005481648.novalocal runuser[85015]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:29:12 np0005481648.novalocal runuser[85069]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:29:12 np0005481648.novalocal runuser[85069]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:29:12 np0005481648.novalocal runuser[85121]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:29:13 np0005481648.novalocal runuser[85121]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:29:13 np0005481648.novalocal runuser[85173]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:29:13 np0005481648.novalocal runuser[85173]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:29:14 np0005481648.novalocal runuser[85225]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:29:14 np0005481648.novalocal runuser[85225]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:29:14 np0005481648.novalocal runuser[85279]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:29:15 np0005481648.novalocal runuser[85279]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:29:15 np0005481648.novalocal runuser[85331]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:29:16 np0005481648.novalocal runuser[85331]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:29:16 np0005481648.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Deactivated successfully. Oct 12 14:29:16 np0005481648.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Consumed 1.234s CPU time. Oct 12 14:29:16 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:16 np0005481648.novalocal systemd-sysv-generator[85413]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:16 np0005481648.novalocal systemd-rc-local-generator[85409]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:16 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:16 np0005481648.novalocal systemd[1]: Started OpenStack Cinder Scheduler Server. Oct 12 14:29:17 np0005481648.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 12 14:29:17 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:17 np0005481648.novalocal systemd-rc-local-generator[85442]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:17 np0005481648.novalocal systemd-sysv-generator[85446]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:17 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:17 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:17 np0005481648.novalocal systemd-rc-local-generator[85472]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:17 np0005481648.novalocal systemd-sysv-generator[85475]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:17 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:17 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:18 np0005481648.novalocal systemd-rc-local-generator[85507]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:18 np0005481648.novalocal systemd-sysv-generator[85510]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:18 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:18 np0005481648.novalocal systemd[1]: Started OpenStack Cinder Volume Server. Oct 12 14:29:18 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:18 np0005481648.novalocal systemd-rc-local-generator[85541]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:18 np0005481648.novalocal systemd-sysv-generator[85544]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:18 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:18 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:18 np0005481648.novalocal systemd-rc-local-generator[85568]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:18 np0005481648.novalocal systemd-sysv-generator[85571]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:18 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:19 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:19 np0005481648.novalocal systemd-rc-local-generator[85602]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:19 np0005481648.novalocal systemd-sysv-generator[85605]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:19 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:19 np0005481648.novalocal systemd[1]: Started OpenStack Cinder Backup Server. Oct 12 14:29:19 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:19 np0005481648.novalocal systemd-sysv-generator[85638]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:19 np0005481648.novalocal systemd-rc-local-generator[85635]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:19 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:20 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:20 np0005481648.novalocal systemd-sysv-generator[85669]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:20 np0005481648.novalocal systemd-rc-local-generator[85666]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:20 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:20 np0005481648.novalocal sudo[85680]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings -o name cinder-volumes Oct 12 14:29:20 np0005481648.novalocal systemd[1]: Created slice User Slice of UID 0. Oct 12 14:29:20 np0005481648.novalocal systemd[1]: Starting User Runtime Directory /run/user/0... Oct 12 14:29:20 np0005481648.novalocal systemd[1]: Finished User Runtime Directory /run/user/0. Oct 12 14:29:20 np0005481648.novalocal systemd[1]: Starting User Manager for UID 0... Oct 12 14:29:20 np0005481648.novalocal systemd[85684]: pam_unix(systemd-user:session): session opened for user root(uid=0) by root(uid=0) Oct 12 14:29:20 np0005481648.novalocal systemd[85684]: Queued start job for default target Main User Target. Oct 12 14:29:20 np0005481648.novalocal systemd[85684]: Created slice User Application Slice. Oct 12 14:29:20 np0005481648.novalocal systemd[85684]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Oct 12 14:29:20 np0005481648.novalocal systemd[85684]: Started Daily Cleanup of User's Temporary Directories. Oct 12 14:29:20 np0005481648.novalocal systemd[85684]: Reached target Paths. Oct 12 14:29:20 np0005481648.novalocal systemd[85684]: Reached target Timers. Oct 12 14:29:20 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:20 np0005481648.novalocal systemd[85684]: Starting D-Bus User Message Bus Socket... Oct 12 14:29:20 np0005481648.novalocal systemd[85684]: PipeWire PulseAudio was skipped because of an unmet condition check (ConditionUser=!root). Oct 12 14:29:20 np0005481648.novalocal systemd[85684]: Listening on PipeWire Multimedia System Sockets. Oct 12 14:29:20 np0005481648.novalocal systemd[85684]: Starting Create User's Volatile Files and Directories... Oct 12 14:29:20 np0005481648.novalocal systemd[85684]: Finished Create User's Volatile Files and Directories. Oct 12 14:29:20 np0005481648.novalocal systemd[85684]: Listening on D-Bus User Message Bus Socket. Oct 12 14:29:20 np0005481648.novalocal systemd[85684]: Reached target Sockets. Oct 12 14:29:20 np0005481648.novalocal systemd[85684]: Reached target Basic System. Oct 12 14:29:20 np0005481648.novalocal systemd[85684]: Reached target Main User Target. Oct 12 14:29:20 np0005481648.novalocal systemd[85684]: Startup finished in 211ms. Oct 12 14:29:20 np0005481648.novalocal systemd-rc-local-generator[85718]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:20 np0005481648.novalocal systemd-sysv-generator[85722]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:20 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:20 np0005481648.novalocal systemd[1]: Started User Manager for UID 0. Oct 12 14:29:20 np0005481648.novalocal systemd[1]: Started Session c1 of User root. Oct 12 14:29:21 np0005481648.novalocal sudo[85680]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:29:21 np0005481648.novalocal systemd[1]: Starting Restore LIO kernel target configuration... Oct 12 14:29:21 np0005481648.novalocal kernel: Rounding down aligned max_sectors from 4294967295 to 4294967288 Oct 12 14:29:21 np0005481648.novalocal target[85728]: No saved config file at /etc/target/saveconfig.json, ok, exiting Oct 12 14:29:21 np0005481648.novalocal systemd[1]: Finished Restore LIO kernel target configuration. Oct 12 14:29:21 np0005481648.novalocal sudo[85680]: pam_unix(sudo:session): session closed for user root Oct 12 14:29:21 np0005481648.novalocal systemd[1]: session-c1.scope: Deactivated successfully. Oct 12 14:29:21 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:21 np0005481648.novalocal systemd-rc-local-generator[85755]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:21 np0005481648.novalocal systemd-sysv-generator[85760]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:21 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:21 np0005481648.novalocal sudo[85737]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Oct 12 14:29:21 np0005481648.novalocal systemd[1]: Started Session c2 of User root. Oct 12 14:29:21 np0005481648.novalocal sudo[85737]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:29:21 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:21 np0005481648.novalocal systemd-rc-local-generator[85787]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:21 np0005481648.novalocal systemd-sysv-generator[85790]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:21 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:22 np0005481648.novalocal sudo[85737]: pam_unix(sudo:session): session closed for user root Oct 12 14:29:22 np0005481648.novalocal systemd[1]: session-c2.scope: Deactivated successfully. Oct 12 14:29:22 np0005481648.novalocal sudo[85802]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:29:22 np0005481648.novalocal systemd[1]: Started Session c3 of User root. Oct 12 14:29:22 np0005481648.novalocal sudo[85802]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:29:22 np0005481648.novalocal runuser[85800]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:29:22 np0005481648.novalocal sudo[85802]: pam_unix(sudo:session): session closed for user root Oct 12 14:29:22 np0005481648.novalocal systemd[1]: session-c3.scope: Deactivated successfully. Oct 12 14:29:22 np0005481648.novalocal sudo[85850]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -L 14.25g cinder-volumes/cinder-volumes-pool Oct 12 14:29:22 np0005481648.novalocal systemd[1]: Started Session c4 of User root. Oct 12 14:29:22 np0005481648.novalocal sudo[85850]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:29:22 np0005481648.novalocal runuser[85800]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:29:22 np0005481648.novalocal runuser[85860]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:29:22 np0005481648.novalocal systemd[1]: Started Device-mapper event daemon. Oct 12 14:29:22 np0005481648.novalocal dmeventd[85941]: dmeventd ready for processing. Oct 12 14:29:22 np0005481648.novalocal dmeventd[85941]: Monitoring thin pool cinder--volumes-cinder--volumes--pool. Oct 12 14:29:22 np0005481648.novalocal lvm[85947]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 12 14:29:22 np0005481648.novalocal lvm[85947]: VG cinder-volumes finished Oct 12 14:29:23 np0005481648.novalocal sudo[85850]: pam_unix(sudo:session): session closed for user root Oct 12 14:29:23 np0005481648.novalocal systemd[1]: session-c4.scope: Deactivated successfully. Oct 12 14:29:23 np0005481648.novalocal sudo[85949]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/cinder-volumes-pool Oct 12 14:29:23 np0005481648.novalocal systemd[1]: Started Session c5 of User root. Oct 12 14:29:23 np0005481648.novalocal sudo[85949]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:29:23 np0005481648.novalocal runuser[85860]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:29:23 np0005481648.novalocal runuser[85960]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:29:23 np0005481648.novalocal sudo[85949]: pam_unix(sudo:session): session closed for user root Oct 12 14:29:23 np0005481648.novalocal systemd[1]: session-c5.scope: Deactivated successfully. Oct 12 14:29:23 np0005481648.novalocal sudo[86007]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C pvs --noheadings --unit=g -o vg_name,name,size,free --separator | --nosuffix --ignoreskippedcluster Oct 12 14:29:23 np0005481648.novalocal systemd[1]: Started Session c6 of User root. Oct 12 14:29:23 np0005481648.novalocal sudo[86007]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:29:23 np0005481648.novalocal sudo[86007]: pam_unix(sudo:session): session closed for user root Oct 12 14:29:23 np0005481648.novalocal systemd[1]: session-c6.scope: Deactivated successfully. Oct 12 14:29:23 np0005481648.novalocal sudo[86013]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:29:23 np0005481648.novalocal systemd[1]: Started Session c7 of User root. Oct 12 14:29:23 np0005481648.novalocal sudo[86013]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:29:23 np0005481648.novalocal runuser[85960]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:29:24 np0005481648.novalocal runuser[86021]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:29:24 np0005481648.novalocal sudo[86013]: pam_unix(sudo:session): session closed for user root Oct 12 14:29:24 np0005481648.novalocal systemd[1]: session-c7.scope: Deactivated successfully. Oct 12 14:29:24 np0005481648.novalocal sudo[86069]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:29:24 np0005481648.novalocal systemd[1]: Started Session c8 of User root. Oct 12 14:29:24 np0005481648.novalocal sudo[86069]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:29:24 np0005481648.novalocal sudo[86069]: pam_unix(sudo:session): session closed for user root Oct 12 14:29:24 np0005481648.novalocal systemd[1]: session-c8.scope: Deactivated successfully. Oct 12 14:29:24 np0005481648.novalocal sudo[86077]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:29:24 np0005481648.novalocal systemd[1]: Started Session c9 of User root. Oct 12 14:29:24 np0005481648.novalocal sudo[86077]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:29:24 np0005481648.novalocal runuser[86021]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:29:24 np0005481648.novalocal runuser[86087]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:29:24 np0005481648.novalocal sudo[86077]: pam_unix(sudo:session): session closed for user root Oct 12 14:29:24 np0005481648.novalocal systemd[1]: session-c9.scope: Deactivated successfully. Oct 12 14:29:25 np0005481648.novalocal sudo[86100]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:29:25 np0005481648.novalocal systemd[1]: Started Session c10 of User root. Oct 12 14:29:25 np0005481648.novalocal sudo[86100]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:29:25 np0005481648.novalocal sudo[86100]: pam_unix(sudo:session): session closed for user root Oct 12 14:29:25 np0005481648.novalocal systemd[1]: session-c10.scope: Deactivated successfully. Oct 12 14:29:25 np0005481648.novalocal sudo[86137]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Oct 12 14:29:25 np0005481648.novalocal systemd[1]: Started Session c11 of User root. Oct 12 14:29:25 np0005481648.novalocal sudo[86137]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:29:25 np0005481648.novalocal runuser[86087]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:29:25 np0005481648.novalocal runuser[86147]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:29:25 np0005481648.novalocal sudo[86137]: pam_unix(sudo:session): session closed for user root Oct 12 14:29:25 np0005481648.novalocal systemd[1]: session-c11.scope: Deactivated successfully. Oct 12 14:29:25 np0005481648.novalocal sudo[86194]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Oct 12 14:29:25 np0005481648.novalocal systemd[1]: Started Session c12 of User root. Oct 12 14:29:25 np0005481648.novalocal sudo[86194]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:29:26 np0005481648.novalocal runuser[86147]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:29:26 np0005481648.novalocal sudo[86194]: pam_unix(sudo:session): session closed for user root Oct 12 14:29:26 np0005481648.novalocal systemd[1]: session-c12.scope: Deactivated successfully. Oct 12 14:29:26 np0005481648.novalocal sudo[86206]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:29:26 np0005481648.novalocal systemd[1]: Started Session c13 of User root. Oct 12 14:29:26 np0005481648.novalocal sudo[86206]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:29:26 np0005481648.novalocal runuser[86205]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:29:26 np0005481648.novalocal sudo[86206]: pam_unix(sudo:session): session closed for user root Oct 12 14:29:26 np0005481648.novalocal systemd[1]: session-c13.scope: Deactivated successfully. Oct 12 14:29:26 np0005481648.novalocal sudo[86254]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:29:26 np0005481648.novalocal systemd[1]: Started Session c14 of User root. Oct 12 14:29:26 np0005481648.novalocal sudo[86254]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:29:26 np0005481648.novalocal runuser[86205]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:29:26 np0005481648.novalocal runuser[86264]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:29:26 np0005481648.novalocal sudo[86254]: pam_unix(sudo:session): session closed for user root Oct 12 14:29:26 np0005481648.novalocal systemd[1]: session-c14.scope: Deactivated successfully. Oct 12 14:29:27 np0005481648.novalocal sudo[86310]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:29:27 np0005481648.novalocal systemd[1]: Started Session c15 of User root. Oct 12 14:29:27 np0005481648.novalocal sudo[86310]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:29:27 np0005481648.novalocal sudo[86310]: pam_unix(sudo:session): session closed for user root Oct 12 14:29:27 np0005481648.novalocal systemd[1]: session-c15.scope: Deactivated successfully. Oct 12 14:29:27 np0005481648.novalocal sudo[86314]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:29:27 np0005481648.novalocal systemd[1]: Started Session c16 of User root. Oct 12 14:29:27 np0005481648.novalocal sudo[86314]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:29:27 np0005481648.novalocal runuser[86264]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:29:27 np0005481648.novalocal sudo[86314]: pam_unix(sudo:session): session closed for user root Oct 12 14:29:27 np0005481648.novalocal systemd[1]: session-c16.scope: Deactivated successfully. Oct 12 14:29:27 np0005481648.novalocal sudo[86330]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:29:27 np0005481648.novalocal systemd[1]: Started Session c17 of User root. Oct 12 14:29:27 np0005481648.novalocal sudo[86330]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:29:27 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:28 np0005481648.novalocal systemd-rc-local-generator[86355]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:28 np0005481648.novalocal systemd-sysv-generator[86358]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:28 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:28 np0005481648.novalocal sudo[86330]: pam_unix(sudo:session): session closed for user root Oct 12 14:29:28 np0005481648.novalocal systemd[1]: session-c17.scope: Deactivated successfully. Oct 12 14:29:28 np0005481648.novalocal sudo[86364]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:29:28 np0005481648.novalocal systemd[1]: Started Session c18 of User root. Oct 12 14:29:28 np0005481648.novalocal sudo[86364]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:29:28 np0005481648.novalocal systemd[1]: Starting OpenStack Neutron (RPC only) Server... Oct 12 14:29:28 np0005481648.novalocal sudo[86364]: pam_unix(sudo:session): session closed for user root Oct 12 14:29:28 np0005481648.novalocal systemd[1]: session-c18.scope: Deactivated successfully. Oct 12 14:29:28 np0005481648.novalocal sudo[86370]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:29:28 np0005481648.novalocal systemd[1]: Started Session c19 of User root. Oct 12 14:29:28 np0005481648.novalocal neutron-rpc-server[86368]: This program is using eventlet and has been monkey_patched Oct 12 14:29:28 np0005481648.novalocal sudo[86370]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:29:29 np0005481648.novalocal sudo[86370]: pam_unix(sudo:session): session closed for user root Oct 12 14:29:29 np0005481648.novalocal systemd[1]: session-c19.scope: Deactivated successfully. Oct 12 14:29:29 np0005481648.novalocal sudo[86378]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:29:29 np0005481648.novalocal systemd[1]: Started Session c20 of User root. Oct 12 14:29:29 np0005481648.novalocal sudo[86378]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:29:29 np0005481648.novalocal sudo[86378]: pam_unix(sudo:session): session closed for user root Oct 12 14:29:29 np0005481648.novalocal systemd[1]: session-c20.scope: Deactivated successfully. Oct 12 14:29:29 np0005481648.novalocal sudo[86383]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:29:29 np0005481648.novalocal systemd[1]: Started Session c21 of User root. Oct 12 14:29:29 np0005481648.novalocal sudo[86383]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:29:30 np0005481648.novalocal sudo[86383]: pam_unix(sudo:session): session closed for user root Oct 12 14:29:30 np0005481648.novalocal systemd[1]: session-c21.scope: Deactivated successfully. Oct 12 14:29:30 np0005481648.novalocal sudo[86387]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:29:30 np0005481648.novalocal systemd[1]: Started Session c22 of User root. Oct 12 14:29:30 np0005481648.novalocal sudo[86387]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:29:30 np0005481648.novalocal sudo[86387]: pam_unix(sudo:session): session closed for user root Oct 12 14:29:30 np0005481648.novalocal systemd[1]: session-c22.scope: Deactivated successfully. Oct 12 14:29:30 np0005481648.novalocal sudo[86391]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:29:30 np0005481648.novalocal systemd[1]: Started Session c23 of User root. Oct 12 14:29:30 np0005481648.novalocal sudo[86391]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:29:30 np0005481648.novalocal sudo[86391]: pam_unix(sudo:session): session closed for user root Oct 12 14:29:30 np0005481648.novalocal systemd[1]: session-c23.scope: Deactivated successfully. Oct 12 14:29:30 np0005481648.novalocal sudo[86396]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:29:30 np0005481648.novalocal systemd[1]: Started Session c24 of User root. Oct 12 14:29:30 np0005481648.novalocal sudo[86396]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:29:31 np0005481648.novalocal sudo[86396]: pam_unix(sudo:session): session closed for user root Oct 12 14:29:31 np0005481648.novalocal systemd[1]: session-c24.scope: Deactivated successfully. Oct 12 14:29:31 np0005481648.novalocal systemd[1]: Started OpenStack Neutron (RPC only) Server. Oct 12 14:29:31 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:31 np0005481648.novalocal systemd-sysv-generator[86427]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:31 np0005481648.novalocal systemd-rc-local-generator[86422]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:31 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:31 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:31 np0005481648.novalocal systemd-rc-local-generator[86455]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:31 np0005481648.novalocal systemd-sysv-generator[86459]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:32 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:32 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:32 np0005481648.novalocal systemd-rc-local-generator[86487]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:32 np0005481648.novalocal systemd-sysv-generator[86490]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:32 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:32 np0005481648.novalocal systemd[1]: Starting OpenStack Neutron Periodic Workers... Oct 12 14:29:33 np0005481648.novalocal neutron-periodic-workers[86496]: This program is using eventlet and has been monkey_patched Oct 12 14:29:35 np0005481648.novalocal systemd[1]: Started OpenStack Neutron Periodic Workers. Oct 12 14:29:35 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:35 np0005481648.novalocal systemd-rc-local-generator[86526]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:35 np0005481648.novalocal systemd-sysv-generator[86529]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:35 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:35 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:35 np0005481648.novalocal systemd-rc-local-generator[86555]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:35 np0005481648.novalocal systemd-sysv-generator[86558]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:36 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:36 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:36 np0005481648.novalocal systemd-rc-local-generator[86587]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:36 np0005481648.novalocal systemd-sysv-generator[86591]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:36 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:36 np0005481648.novalocal systemd[1]: Started OpenStack Neutron OVN Agent. Oct 12 14:29:36 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:37 np0005481648.novalocal systemd-rc-local-generator[86624]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:37 np0005481648.novalocal systemd-sysv-generator[86627]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:37 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:37 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:37 np0005481648.novalocal systemd-rc-local-generator[86652]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:37 np0005481648.novalocal systemd-sysv-generator[86655]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:37 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:37 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:37 np0005481648.novalocal systemd-sysv-generator[86685]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:37 np0005481648.novalocal systemd-rc-local-generator[86680]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:37 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:38 np0005481648.novalocal systemd[1]: Started OpenStack Neutron VPNaaS support for OVN. Oct 12 14:29:38 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:38 np0005481648.novalocal systemd-rc-local-generator[86713]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:38 np0005481648.novalocal systemd-sysv-generator[86719]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:38 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:38 np0005481648.novalocal neutron-ovn-vpn-agent[86693]: This program is using eventlet and has been monkey_patched Oct 12 14:29:38 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:38 np0005481648.novalocal systemd-rc-local-generator[86756]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:38 np0005481648.novalocal systemd-sysv-generator[86760]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:38 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:38 np0005481648.novalocal sudo[86734]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /etc/neutron/plugins/ml2/ovn_agent.ini --config-dir /etc/neutron/conf.d/neutron-ovn-agent --privsep_context neutron.privileged.namespace_cmd --privsep_sock_path /tmp/tmpx4c0aryv/privsep.sock Oct 12 14:29:38 np0005481648.novalocal systemd[1]: Started Session c25 of User root. Oct 12 14:29:38 np0005481648.novalocal sudo[86734]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 12 14:29:39 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:39 np0005481648.novalocal systemd-sysv-generator[86798]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:39 np0005481648.novalocal systemd-rc-local-generator[86790]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:39 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:39 np0005481648.novalocal kernel: capability: warning: `privsep-helper' uses deprecated v2 capabilities in a way that may be insecure Oct 12 14:29:39 np0005481648.novalocal systemd[1]: Starting OpenStack Neutron OVN Maintenance Worker... Oct 12 14:29:39 np0005481648.novalocal sudo[86734]: pam_unix(sudo:session): session closed for user root Oct 12 14:29:40 np0005481648.novalocal neutron-ovn-maintenance-worker[86803]: This program is using eventlet and has been monkey_patched Oct 12 14:29:40 np0005481648.novalocal sudo[86819]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/ovn_vpn_agent.ini --privsep_context neutron.privileged.namespace_cmd --privsep_sock_path /tmp/tmpkp7c381i/privsep.sock Oct 12 14:29:40 np0005481648.novalocal systemd[1]: Started Session c26 of User root. Oct 12 14:29:40 np0005481648.novalocal sudo[86819]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 12 14:29:41 np0005481648.novalocal sudo[86819]: pam_unix(sudo:session): session closed for user root Oct 12 14:29:42 np0005481648.novalocal systemd[1]: Started OpenStack Neutron OVN Maintenance Worker. Oct 12 14:29:42 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:42 np0005481648.novalocal systemd-rc-local-generator[86854]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:42 np0005481648.novalocal systemd-sysv-generator[86858]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:42 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:43 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:43 np0005481648.novalocal systemd-rc-local-generator[86887]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:43 np0005481648.novalocal systemd-sysv-generator[86891]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:43 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:43 np0005481648.novalocal runuser[86897]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:29:44 np0005481648.novalocal runuser[86897]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:29:44 np0005481648.novalocal runuser[86949]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:29:44 np0005481648.novalocal runuser[86949]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:29:44 np0005481648.novalocal runuser[87004]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:29:45 np0005481648.novalocal runuser[87004]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:29:45 np0005481648.novalocal runuser[87056]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:29:46 np0005481648.novalocal runuser[87056]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:29:46 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:46 np0005481648.novalocal systemd-rc-local-generator[87135]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:46 np0005481648.novalocal systemd-sysv-generator[87139]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:46 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:46 np0005481648.novalocal systemd[1]: Listening on libvirt proxy daemon socket. Oct 12 14:29:46 np0005481648.novalocal systemd[1]: Listening on libvirt proxy daemon non-TLS IP socket. Oct 12 14:29:47 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:47 np0005481648.novalocal systemd-sysv-generator[87169]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:47 np0005481648.novalocal systemd-rc-local-generator[87166]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:47 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:47 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:47 np0005481648.novalocal systemd-rc-local-generator[87196]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:47 np0005481648.novalocal systemd-sysv-generator[87200]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:47 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:48 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:48 np0005481648.novalocal systemd-rc-local-generator[87230]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:48 np0005481648.novalocal systemd-sysv-generator[87234]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:48 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:48 np0005481648.novalocal systemd[1]: Listening on libvirt locking daemon socket. Oct 12 14:29:48 np0005481648.novalocal systemd[1]: Listening on libvirt locking daemon admin socket. Oct 12 14:29:48 np0005481648.novalocal systemd[1]: Starting libvirt locking daemon... Oct 12 14:29:48 np0005481648.novalocal systemd[1]: Started libvirt locking daemon. Oct 12 14:29:48 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:48 np0005481648.novalocal systemd-rc-local-generator[87261]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:48 np0005481648.novalocal systemd-sysv-generator[87266]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:48 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:49 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:49 np0005481648.novalocal systemd-sysv-generator[87296]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:49 np0005481648.novalocal systemd-rc-local-generator[87293]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:49 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:49 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:49 np0005481648.novalocal systemd-rc-local-generator[87321]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:49 np0005481648.novalocal systemd-sysv-generator[87324]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:49 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:50 np0005481648.novalocal systemd[1]: Listening on libvirt logging daemon socket. Oct 12 14:29:50 np0005481648.novalocal systemd[1]: Listening on libvirt logging daemon admin socket. Oct 12 14:29:50 np0005481648.novalocal systemd[1]: Starting libvirt logging daemon... Oct 12 14:29:50 np0005481648.novalocal systemd[1]: Started libvirt logging daemon. Oct 12 14:29:50 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:50 np0005481648.novalocal systemd-rc-local-generator[87356]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:50 np0005481648.novalocal systemd-sysv-generator[87359]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:50 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:50 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:50 np0005481648.novalocal systemd-rc-local-generator[87384]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:50 np0005481648.novalocal systemd-sysv-generator[87388]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:50 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:51 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:51 np0005481648.novalocal systemd-rc-local-generator[87419]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:51 np0005481648.novalocal systemd-sysv-generator[87422]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:51 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:51 np0005481648.novalocal systemd[1]: Listening on libvirt secret daemon socket. Oct 12 14:29:51 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:52 np0005481648.novalocal systemd-rc-local-generator[87454]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:52 np0005481648.novalocal systemd-sysv-generator[87457]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:52 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:52 np0005481648.novalocal systemd[1]: Listening on libvirt nodedev daemon socket. Oct 12 14:29:52 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:52 np0005481648.novalocal systemd-rc-local-generator[87490]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:52 np0005481648.novalocal systemd-sysv-generator[87493]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:52 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:53 np0005481648.novalocal systemd[1]: Listening on libvirt QEMU daemon socket. Oct 12 14:29:53 np0005481648.novalocal systemd[1]: virtproxyd-tcp.socket: Deactivated successfully. Oct 12 14:29:53 np0005481648.novalocal systemd[1]: Closed libvirt proxy daemon non-TLS IP socket. Oct 12 14:29:53 np0005481648.novalocal systemd[1]: Stopping libvirt proxy daemon non-TLS IP socket... Oct 12 14:29:53 np0005481648.novalocal systemd[1]: virtproxyd.socket: Deactivated successfully. Oct 12 14:29:53 np0005481648.novalocal systemd[1]: Closed libvirt proxy daemon socket. Oct 12 14:29:53 np0005481648.novalocal systemd[1]: Stopping libvirt proxy daemon socket... Oct 12 14:29:53 np0005481648.novalocal systemd[1]: Listening on libvirt proxy daemon socket. Oct 12 14:29:53 np0005481648.novalocal systemd[1]: Listening on libvirt proxy daemon non-TLS IP socket. Oct 12 14:29:54 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:54 np0005481648.novalocal systemd-rc-local-generator[87532]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:54 np0005481648.novalocal systemd-sysv-generator[87536]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:54 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:54 np0005481648.novalocal systemd[1]: Listening on libvirt storage daemon socket. Oct 12 14:29:54 np0005481648.novalocal systemd[1]: Created slice Virtual Machine and Container Slice. Oct 12 14:29:54 np0005481648.novalocal systemd[1]: Listening on libvirt QEMU daemon admin socket. Oct 12 14:29:54 np0005481648.novalocal systemd[1]: Listening on libvirt QEMU daemon read-only socket. Oct 12 14:29:54 np0005481648.novalocal systemd[1]: Virtual Machine and Container Storage (Compatibility) was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 12 14:29:54 np0005481648.novalocal systemd[1]: Starting Virtual Machine and Container Registration Service... Oct 12 14:29:54 np0005481648.novalocal systemd[1]: Started Virtual Machine and Container Registration Service. Oct 12 14:29:54 np0005481648.novalocal systemd[1]: Starting libvirt QEMU daemon... Oct 12 14:29:54 np0005481648.novalocal systemd[1]: Started libvirt QEMU daemon. Oct 12 14:29:54 np0005481648.novalocal virtqemud[87547]: libvirt version: 10.10.0, package: 15.el9 (builder@centos.org, 2025-08-18-13:22:20, ) Oct 12 14:29:54 np0005481648.novalocal virtqemud[87547]: hostname: np0005481648.novalocal Oct 12 14:29:54 np0005481648.novalocal virtqemud[87547]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Oct 12 14:29:54 np0005481648.novalocal virtqemud[87547]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Oct 12 14:29:55 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:55 np0005481648.novalocal systemd-sysv-generator[87596]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:55 np0005481648.novalocal systemd-rc-local-generator[87593]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:55 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:55 np0005481648.novalocal systemd[1]: Reached target libvirt guests shutdown target. Oct 12 14:29:55 np0005481648.novalocal systemd[1]: Starting libvirt guests suspend/resume service... Oct 12 14:29:55 np0005481648.novalocal systemd[1]: Finished libvirt guests suspend/resume service. Oct 12 14:29:55 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:55 np0005481648.novalocal systemd-rc-local-generator[87629]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:55 np0005481648.novalocal systemd-sysv-generator[87633]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:55 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:55 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:55 np0005481648.novalocal systemd-rc-local-generator[87660]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:55 np0005481648.novalocal systemd-sysv-generator[87663]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:55 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:56 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:56 np0005481648.novalocal systemd-rc-local-generator[87696]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:56 np0005481648.novalocal systemd-sysv-generator[87699]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:56 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:56 np0005481648.novalocal systemd[1]: Started OpenStack Nova NoVNC Proxy Server. Oct 12 14:29:57 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:57 np0005481648.novalocal systemd-sysv-generator[87730]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:57 np0005481648.novalocal systemd-rc-local-generator[87726]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:57 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:57 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:29:57 np0005481648.novalocal systemd-rc-local-generator[87754]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:29:57 np0005481648.novalocal systemd-sysv-generator[87757]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:29:57 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:29:57 np0005481648.novalocal runuser[87766]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:29:58 np0005481648.novalocal runuser[87766]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:29:58 np0005481648.novalocal runuser[87818]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:29:59 np0005481648.novalocal runuser[87818]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:29:59 np0005481648.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 12 14:29:59 np0005481648.novalocal runuser[87872]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:29:59 np0005481648.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 12 14:29:59 np0005481648.novalocal runuser[87872]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:29:59 np0005481648.novalocal runuser[87924]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:29:59 np0005481648.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service. Oct 12 14:30:00 np0005481648.novalocal runuser[87924]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:30:00 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:30:00 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:30:00 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:30:00 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:30:00 np0005481648.novalocal systemd-rc-local-generator[88015]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:30:00 np0005481648.novalocal systemd-sysv-generator[88018]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:30:00 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:30:01 np0005481648.novalocal systemd[1]: Created slice User Slice of UID 161. Oct 12 14:30:01 np0005481648.novalocal systemd[1]: Starting User Runtime Directory /run/user/161... Oct 12 14:30:01 np0005481648.novalocal systemd[1]: Finished User Runtime Directory /run/user/161. Oct 12 14:30:01 np0005481648.novalocal systemd[1]: Started OpenStack Octavia Health-Manager service. Oct 12 14:30:01 np0005481648.novalocal systemd[1]: Starting User Manager for UID 161... Oct 12 14:30:01 np0005481648.novalocal systemd[88028]: pam_unix(systemd-user:session): session opened for user glance(uid=161) by glance(uid=0) Oct 12 14:30:01 np0005481648.novalocal systemd[88028]: Queued start job for default target Main User Target. Oct 12 14:30:01 np0005481648.novalocal systemd[88028]: Created slice User Application Slice. Oct 12 14:30:01 np0005481648.novalocal systemd[88028]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Oct 12 14:30:01 np0005481648.novalocal systemd[88028]: Started Daily Cleanup of User's Temporary Directories. Oct 12 14:30:01 np0005481648.novalocal systemd[88028]: Reached target Paths. Oct 12 14:30:01 np0005481648.novalocal systemd[88028]: Reached target Timers. Oct 12 14:30:01 np0005481648.novalocal systemd[88028]: Starting D-Bus User Message Bus Socket... Oct 12 14:30:01 np0005481648.novalocal systemd[88028]: Listening on PipeWire PulseAudio. Oct 12 14:30:01 np0005481648.novalocal systemd[88028]: Listening on PipeWire Multimedia System Sockets. Oct 12 14:30:01 np0005481648.novalocal systemd[88028]: Starting Create User's Volatile Files and Directories... Oct 12 14:30:01 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:30:01 np0005481648.novalocal systemd[88028]: Listening on D-Bus User Message Bus Socket. Oct 12 14:30:01 np0005481648.novalocal systemd[88028]: Reached target Sockets. Oct 12 14:30:01 np0005481648.novalocal systemd[88028]: Finished Create User's Volatile Files and Directories. Oct 12 14:30:01 np0005481648.novalocal systemd[88028]: Reached target Basic System. Oct 12 14:30:01 np0005481648.novalocal systemd[88028]: Reached target Main User Target. Oct 12 14:30:01 np0005481648.novalocal systemd[88028]: Startup finished in 170ms. Oct 12 14:30:01 np0005481648.novalocal systemd-rc-local-generator[88060]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:30:01 np0005481648.novalocal systemd-sysv-generator[88063]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:30:01 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:30:01 np0005481648.novalocal setroubleshoot[87871]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l a985cbc3-4f3e-4a82-b409-b4e8a0a8089a Oct 12 14:30:01 np0005481648.novalocal setroubleshoot[87871]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Oct 12 14:30:01 np0005481648.novalocal setroubleshoot[87871]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l b0a533b5-dcbb-4f80-b81f-5d69def6e893 Oct 12 14:30:01 np0005481648.novalocal setroubleshoot[87871]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Oct 12 14:30:01 np0005481648.novalocal setroubleshoot[87871]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l c5b466c7-b194-4574-a7be-a8a34959d9f1 Oct 12 14:30:01 np0005481648.novalocal setroubleshoot[87871]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Oct 12 14:30:01 np0005481648.novalocal setroubleshoot[87871]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 2b606d2a-bc5e-4464-984b-521e303b86ea Oct 12 14:30:01 np0005481648.novalocal setroubleshoot[87871]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Oct 12 14:30:01 np0005481648.novalocal systemd[1]: Started User Manager for UID 161. Oct 12 14:30:01 np0005481648.novalocal setroubleshoot[87871]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l 01b45d91-48bb-461b-8c58-87cce828dc56 Oct 12 14:30:01 np0005481648.novalocal setroubleshoot[87871]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Oct 12 14:30:01 np0005481648.novalocal systemd[1]: Started Session 5 of User glance. Oct 12 14:30:01 np0005481648.novalocal setroubleshoot[87871]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l 61a1f98f-5ca0-4f97-89f8-9be306e4ddd4 Oct 12 14:30:01 np0005481648.novalocal CROND[88075]: (glance) CMD (glance-cache-pruner) Oct 12 14:30:01 np0005481648.novalocal setroubleshoot[87871]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Oct 12 14:30:01 np0005481648.novalocal setroubleshoot[87871]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l 6822d3b9-6bfc-45a4-94fc-a74c4ca51cd1 Oct 12 14:30:01 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:30:01 np0005481648.novalocal setroubleshoot[87871]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Oct 12 14:30:01 np0005481648.novalocal setroubleshoot[87871]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l ce1630b3-68ed-42d6-a721-c9806e2388d4 Oct 12 14:30:01 np0005481648.novalocal setroubleshoot[87871]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Oct 12 14:30:01 np0005481648.novalocal systemd-rc-local-generator[88100]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:30:01 np0005481648.novalocal setroubleshoot[87871]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l 3856a0e2-d638-42f3-8cc4-75c36eab42cf Oct 12 14:30:01 np0005481648.novalocal setroubleshoot[87871]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Oct 12 14:30:01 np0005481648.novalocal systemd-sysv-generator[88105]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:30:01 np0005481648.novalocal setroubleshoot[87871]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l c8019e17-288f-4b92-9cce-13edceed9f5e Oct 12 14:30:01 np0005481648.novalocal setroubleshoot[87871]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Oct 12 14:30:01 np0005481648.novalocal setroubleshoot[87871]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l 5c9bc52c-af02-4521-87ea-e9f234c170bf Oct 12 14:30:01 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:30:01 np0005481648.novalocal setroubleshoot[87871]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Oct 12 14:30:02 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:30:02 np0005481648.novalocal CROND[88023]: (glance) CMDOUT (2025-10-12 14:30:02.496 88075 INFO glance.image_cache [-] Image cache loaded driver 'centralized_db'.) Oct 12 14:30:02 np0005481648.novalocal systemd-rc-local-generator[88133]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:30:02 np0005481648.novalocal systemd-sysv-generator[88138]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:30:02 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:30:02 np0005481648.novalocal CROND[88023]: (glance) CMDOUT (2025-10-12 14:30:02.822 88075 DEBUG glance.image_cache [None req-dff92450-4a81-4f31-9eb5-1136d92571a5 - - - - - -] Image cache has free space, skipping prune... prune /usr/lib/python3.9/site-packages/glance/image_cache/__init__.py:291) Oct 12 14:30:02 np0005481648.novalocal systemd[1]: Started OpenStack Octavia Housekeeping service. Oct 12 14:30:03 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:30:03 np0005481648.novalocal CROND[88023]: (glance) CMDEND (glance-cache-pruner) Oct 12 14:30:03 np0005481648.novalocal systemd-sysv-generator[88167]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:30:03 np0005481648.novalocal systemd-rc-local-generator[88164]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:30:03 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:30:03 np0005481648.novalocal systemd[1]: session-5.scope: Deactivated successfully. Oct 12 14:30:03 np0005481648.novalocal systemd[1]: session-5.scope: Consumed 1.282s CPU time. Oct 12 14:30:03 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:30:03 np0005481648.novalocal systemd-rc-local-generator[88193]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:30:03 np0005481648.novalocal systemd-sysv-generator[88198]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:30:03 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:30:03 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:30:04 np0005481648.novalocal systemd-rc-local-generator[88228]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:30:04 np0005481648.novalocal systemd-sysv-generator[88233]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:30:04 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:30:04 np0005481648.novalocal systemd[1]: Started OpenStack Octavia Driver Agent service. Oct 12 14:30:04 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:30:04 np0005481648.novalocal systemd-sysv-generator[88264]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:30:04 np0005481648.novalocal systemd-rc-local-generator[88261]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:30:04 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:30:04 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:30:04 np0005481648.novalocal systemd-sysv-generator[88330]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:30:04 np0005481648.novalocal systemd-rc-local-generator[88326]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:30:04 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:30:05 np0005481648.novalocal runuser[88339]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:30:05 np0005481648.novalocal runuser[88339]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:30:05 np0005481648.novalocal runuser[88393]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:30:06 np0005481648.novalocal runuser[88393]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:30:06 np0005481648.novalocal runuser[88446]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:30:07 np0005481648.novalocal runuser[88446]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:30:07 np0005481648.novalocal runuser[88502]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:30:07 np0005481648.novalocal runuser[88502]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:30:08 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:30:08 np0005481648.novalocal systemd-sysv-generator[88590]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:30:08 np0005481648.novalocal systemd-rc-local-generator[88587]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:30:08 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:30:08 np0005481648.novalocal systemd[1]: Started OpenStack Manila Scheduler. Oct 12 14:30:08 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:30:08 np0005481648.novalocal systemd-rc-local-generator[88629]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:30:08 np0005481648.novalocal systemd-sysv-generator[88632]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:30:08 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:30:09 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:30:09 np0005481648.novalocal systemd-rc-local-generator[88662]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:30:09 np0005481648.novalocal systemd-sysv-generator[88666]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:30:09 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:30:09 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:30:09 np0005481648.novalocal systemd-rc-local-generator[88695]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:30:09 np0005481648.novalocal systemd-sysv-generator[88698]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:30:09 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:30:09 np0005481648.novalocal systemd[1]: Started OpenStack Manila Share Service. Oct 12 14:30:10 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:30:10 np0005481648.novalocal systemd-rc-local-generator[88727]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:30:10 np0005481648.novalocal systemd-sysv-generator[88730]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:30:10 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:30:10 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:30:10 np0005481648.novalocal systemd-rc-local-generator[88756]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:30:10 np0005481648.novalocal systemd-sysv-generator[88759]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:30:10 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:30:11 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:30:11 np0005481648.novalocal systemd-rc-local-generator[88791]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:30:11 np0005481648.novalocal systemd-sysv-generator[88794]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:30:11 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:30:11 np0005481648.novalocal systemd[1]: Started OpenStack Manila Data Server. Oct 12 14:30:11 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:30:11 np0005481648.novalocal systemd-sysv-generator[88830]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:30:11 np0005481648.novalocal systemd-rc-local-generator[88826]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:30:11 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:30:11 np0005481648.novalocal sudo[88834]: manila : PWD=/ ; USER=root ; COMMAND=/usr/bin/privsep-helper --config-file /usr/share/manila/manila-dist.conf --config-file /etc/manila/manila.conf --privsep_context manila.privsep.sys_admin_pctxt --privsep_sock_path /tmp/tmpg51r7up9/privsep.sock Oct 12 14:30:11 np0005481648.novalocal systemd[1]: Started Session c27 of User root. Oct 12 14:30:11 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:30:12 np0005481648.novalocal systemd-sysv-generator[88860]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:30:12 np0005481648.novalocal systemd-rc-local-generator[88856]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:30:12 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:30:12 np0005481648.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 12 14:30:12 np0005481648.novalocal systemd[1]: setroubleshootd.service: Consumed 1.375s CPU time. Oct 12 14:30:12 np0005481648.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service: Deactivated successfully. Oct 12 14:30:12 np0005481648.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service: Consumed 1.422s CPU time. Oct 12 14:30:12 np0005481648.novalocal sudo[88834]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=978) Oct 12 14:30:12 np0005481648.novalocal sudo[88834]: pam_unix(sudo:session): session closed for user root Oct 12 14:30:12 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:30:12 np0005481648.novalocal systemd-rc-local-generator[88897]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:30:13 np0005481648.novalocal systemd-sysv-generator[88901]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:30:13 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:30:13 np0005481648.novalocal systemd[1]: Starting One-time temporary TLS key generation for httpd.service... Oct 12 14:30:13 np0005481648.novalocal systemd[1]: httpd-init.service: Deactivated successfully. Oct 12 14:30:13 np0005481648.novalocal systemd[1]: Finished One-time temporary TLS key generation for httpd.service. Oct 12 14:30:13 np0005481648.novalocal systemd[1]: Starting The Apache HTTP Server... Oct 12 14:30:13 np0005481648.novalocal systemd[1]: Stopping User Manager for UID 161... Oct 12 14:30:13 np0005481648.novalocal systemd[88028]: Activating special unit Exit the Session... Oct 12 14:30:13 np0005481648.novalocal systemd[88028]: Stopped target Main User Target. Oct 12 14:30:13 np0005481648.novalocal systemd[88028]: Stopped target Basic System. Oct 12 14:30:13 np0005481648.novalocal systemd[88028]: Stopped target Paths. Oct 12 14:30:13 np0005481648.novalocal systemd[88028]: Stopped target Sockets. Oct 12 14:30:13 np0005481648.novalocal systemd[88028]: Stopped target Timers. Oct 12 14:30:13 np0005481648.novalocal systemd[88028]: Stopped Daily Cleanup of User's Temporary Directories. Oct 12 14:30:13 np0005481648.novalocal systemd[88028]: Closed D-Bus User Message Bus Socket. Oct 12 14:30:13 np0005481648.novalocal systemd[88028]: Closed PipeWire PulseAudio. Oct 12 14:30:13 np0005481648.novalocal systemd[88028]: Closed PipeWire Multimedia System Sockets. Oct 12 14:30:13 np0005481648.novalocal systemd[88028]: Stopped Create User's Volatile Files and Directories. Oct 12 14:30:13 np0005481648.novalocal systemd[88028]: Removed slice User Application Slice. Oct 12 14:30:13 np0005481648.novalocal systemd[88028]: Reached target Shutdown. Oct 12 14:30:13 np0005481648.novalocal systemd[88028]: Finished Exit the Session. Oct 12 14:30:13 np0005481648.novalocal systemd[88028]: Reached target Exit the Session. Oct 12 14:30:13 np0005481648.novalocal systemd[1]: user@161.service: Deactivated successfully. Oct 12 14:30:13 np0005481648.novalocal systemd[1]: Stopped User Manager for UID 161. Oct 12 14:30:13 np0005481648.novalocal systemd[1]: Stopping User Runtime Directory /run/user/161... Oct 12 14:30:13 np0005481648.novalocal systemd[1]: run-user-161.mount: Deactivated successfully. Oct 12 14:30:13 np0005481648.novalocal systemd[1]: user-runtime-dir@161.service: Deactivated successfully. Oct 12 14:30:13 np0005481648.novalocal systemd[1]: Stopped User Runtime Directory /run/user/161. Oct 12 14:30:13 np0005481648.novalocal systemd[1]: Removed slice User Slice of UID 161. Oct 12 14:30:13 np0005481648.novalocal systemd[1]: user-161.slice: Consumed 1.514s CPU time. Oct 12 14:30:14 np0005481648.novalocal python3[88911]: /usr/lib/python3.9/site-packages/debreach/__init__.py:6: DeprecationWarning: distutils Version classes are deprecated. Use packaging.version instead. Oct 12 14:30:14 np0005481648.novalocal python3[88911]: version_info = version.StrictVersion(__version__).version Oct 12 14:30:17 np0005481648.novalocal python3[88918]: /usr/lib/python3.9/site-packages/debreach/__init__.py:6: DeprecationWarning: distutils Version classes are deprecated. Use packaging.version instead. Oct 12 14:30:17 np0005481648.novalocal python3[88918]: version_info = version.StrictVersion(__version__).version Oct 12 14:30:21 np0005481648.novalocal httpd[88928]: Server configured, listening on: ::1 port 9876, ... Oct 12 14:30:21 np0005481648.novalocal systemd[1]: Started The Apache HTTP Server. Oct 12 14:30:22 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:30:22 np0005481648.novalocal systemd-rc-local-generator[89044]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:30:22 np0005481648.novalocal systemd-sysv-generator[89049]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:30:22 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:30:22 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:30:22 np0005481648.novalocal systemd-sysv-generator[89077]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:30:22 np0005481648.novalocal systemd-rc-local-generator[89072]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:30:22 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:30:22 np0005481648.novalocal crontab[89084]: (root) REPLACE (keystone) Oct 12 14:30:25 np0005481648.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 12 14:30:25 np0005481648.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 12 14:30:25 np0005481648.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service. Oct 12 14:30:27 np0005481648.novalocal setroubleshoot[89093]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/keystone/(null). For complete SELinux messages run: sealert -l 01957db3-2335-46a3-bca0-351742b9229a Oct 12 14:30:27 np0005481648.novalocal setroubleshoot[89093]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 12 14:30:27 np0005481648.novalocal setroubleshoot[89093]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/keystone/(null). For complete SELinux messages run: sealert -l 1248e262-9a69-4c5a-9a96-5093e9f8aa1a Oct 12 14:30:27 np0005481648.novalocal setroubleshoot[89093]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 12 14:30:27 np0005481648.novalocal setroubleshoot[89093]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/keystone/(null). For complete SELinux messages run: sealert -l fc197581-cf19-4473-8670-32bc8db67a53 Oct 12 14:30:27 np0005481648.novalocal setroubleshoot[89093]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 12 14:30:27 np0005481648.novalocal setroubleshoot[89093]: failed to retrieve rpm info for path '/var/lib/keystone/.cache/python-entrypoints/3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2': Oct 12 14:30:27 np0005481648.novalocal setroubleshoot[89093]: SELinux is preventing /usr/sbin/httpd from write access on the file /var/lib/keystone/.cache/python-entrypoints/3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2. For complete SELinux messages run: sealert -l 8440eaae-2212-4b04-94b3-56ad78a3b558 Oct 12 14:30:27 np0005481648.novalocal setroubleshoot[89093]: SELinux is preventing /usr/sbin/httpd from write access on the file /var/lib/keystone/.cache/python-entrypoints/3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the 3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 12 14:30:35 np0005481648.novalocal sudo[89122]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:30:35 np0005481648.novalocal systemd[1]: Started Session c28 of User root. Oct 12 14:30:35 np0005481648.novalocal sudo[89122]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:30:35 np0005481648.novalocal sudo[89122]: pam_unix(sudo:session): session closed for user root Oct 12 14:30:35 np0005481648.novalocal systemd[1]: session-c28.scope: Deactivated successfully. Oct 12 14:30:35 np0005481648.novalocal sudo[89128]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:30:35 np0005481648.novalocal systemd[1]: Started Session c29 of User root. Oct 12 14:30:35 np0005481648.novalocal sudo[89128]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:30:36 np0005481648.novalocal sudo[89128]: pam_unix(sudo:session): session closed for user root Oct 12 14:30:36 np0005481648.novalocal systemd[1]: session-c29.scope: Deactivated successfully. Oct 12 14:30:36 np0005481648.novalocal sudo[89132]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:30:36 np0005481648.novalocal systemd[1]: Started Session c30 of User root. Oct 12 14:30:36 np0005481648.novalocal sudo[89132]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:30:36 np0005481648.novalocal sudo[89132]: pam_unix(sudo:session): session closed for user root Oct 12 14:30:36 np0005481648.novalocal systemd[1]: session-c30.scope: Deactivated successfully. Oct 12 14:30:36 np0005481648.novalocal sudo[89136]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:30:36 np0005481648.novalocal systemd[1]: Started Session c31 of User root. Oct 12 14:30:36 np0005481648.novalocal sudo[89136]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:30:36 np0005481648.novalocal sudo[89136]: pam_unix(sudo:session): session closed for user root Oct 12 14:30:36 np0005481648.novalocal systemd[1]: session-c31.scope: Deactivated successfully. Oct 12 14:30:37 np0005481648.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service: Deactivated successfully. Oct 12 14:30:37 np0005481648.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service: Consumed 1.269s CPU time. Oct 12 14:30:37 np0005481648.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 12 14:30:37 np0005481648.novalocal systemd[1]: setroubleshootd.service: Consumed 1.113s CPU time. Oct 12 14:31:00 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:31:00 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:31:00 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:31:05 np0005481648.novalocal octavia-health-manager[88385]: /usr/lib/python3.9/site-packages/octavia/db/repositories.py:1661: SAWarning: Coercing Subquery object into a select() for use in IN(); please pass a select() construct explicitly Oct 12 14:31:05 np0005481648.novalocal octavia-health-manager[88385]: self.model_class.amphora_id.in_(expired_ids_query) Oct 12 14:31:35 np0005481648.novalocal sudo[89283]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:31:35 np0005481648.novalocal systemd[1]: Started Session c32 of User root. Oct 12 14:31:35 np0005481648.novalocal sudo[89283]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:31:35 np0005481648.novalocal sudo[89283]: pam_unix(sudo:session): session closed for user root Oct 12 14:31:35 np0005481648.novalocal systemd[1]: session-c32.scope: Deactivated successfully. Oct 12 14:31:35 np0005481648.novalocal sudo[89287]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:31:35 np0005481648.novalocal systemd[1]: Started Session c33 of User root. Oct 12 14:31:35 np0005481648.novalocal sudo[89287]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:31:36 np0005481648.novalocal sudo[89287]: pam_unix(sudo:session): session closed for user root Oct 12 14:31:36 np0005481648.novalocal systemd[1]: session-c33.scope: Deactivated successfully. Oct 12 14:31:36 np0005481648.novalocal sudo[89291]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:31:36 np0005481648.novalocal systemd[1]: Started Session c34 of User root. Oct 12 14:31:36 np0005481648.novalocal sudo[89291]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:31:36 np0005481648.novalocal sudo[89291]: pam_unix(sudo:session): session closed for user root Oct 12 14:31:36 np0005481648.novalocal systemd[1]: session-c34.scope: Deactivated successfully. Oct 12 14:31:36 np0005481648.novalocal sudo[89295]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:31:36 np0005481648.novalocal systemd[1]: Started Session c35 of User root. Oct 12 14:31:36 np0005481648.novalocal sudo[89295]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:31:36 np0005481648.novalocal sudo[89295]: pam_unix(sudo:session): session closed for user root Oct 12 14:31:36 np0005481648.novalocal systemd[1]: session-c35.scope: Deactivated successfully. Oct 12 14:31:48 np0005481648.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 12 14:31:49 np0005481648.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 12 14:31:49 np0005481648.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service. Oct 12 14:31:50 np0005481648.novalocal setroubleshoot[89324]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l d896e124-d96f-49f6-a393-b0c0e2903c41 Oct 12 14:31:50 np0005481648.novalocal setroubleshoot[89324]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Oct 12 14:31:50 np0005481648.novalocal setroubleshoot[89324]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 32cf8b1f-e823-442c-837f-0a63f6aa3b81 Oct 12 14:31:50 np0005481648.novalocal setroubleshoot[89324]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Oct 12 14:31:50 np0005481648.novalocal setroubleshoot[89324]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 6b9af58a-36e3-4678-bcbf-b7cbb136ebd5 Oct 12 14:31:50 np0005481648.novalocal setroubleshoot[89324]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Oct 12 14:31:54 np0005481648.novalocal systemd[1]: virtqemud.service: Deactivated successfully. Oct 12 14:32:00 np0005481648.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service: Deactivated successfully. Oct 12 14:32:00 np0005481648.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service: Consumed 1.252s CPU time. Oct 12 14:32:00 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:32:00 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:32:00 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:32:01 np0005481648.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 12 14:32:01 np0005481648.novalocal systemd[1]: setroubleshootd.service: Consumed 1.052s CPU time. Oct 12 14:32:17 np0005481648.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 12 14:32:17 np0005481648.novalocal sshd-session[89432]: Invalid user sol from 209.38.110.19 port 58930 Oct 12 14:32:17 np0005481648.novalocal sshd-session[89432]: Connection closed by invalid user sol 209.38.110.19 port 58930 [preauth] Oct 12 14:32:17 np0005481648.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 12 14:32:18 np0005481648.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service. Oct 12 14:32:19 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l d896e124-d96f-49f6-a393-b0c0e2903c41 Oct 12 14:32:19 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Oct 12 14:32:19 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 32cf8b1f-e823-442c-837f-0a63f6aa3b81 Oct 12 14:32:19 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Oct 12 14:32:19 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 6b9af58a-36e3-4678-bcbf-b7cbb136ebd5 Oct 12 14:32:20 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Oct 12 14:32:23 np0005481648.novalocal sudo[89467]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-679f980e-859b-4f86-951a-5a764e8b682c cinder-volumes/cinder-volumes-pool Oct 12 14:32:23 np0005481648.novalocal systemd[1]: Started Session c36 of User root. Oct 12 14:32:23 np0005481648.novalocal sudo[89467]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:32:23 np0005481648.novalocal dmeventd[85941]: No longer monitoring thin pool cinder--volumes-cinder--volumes--pool. Oct 12 14:32:25 np0005481648.novalocal dmeventd[85941]: Monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Oct 12 14:32:25 np0005481648.novalocal lvm[89526]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 12 14:32:25 np0005481648.novalocal lvm[89526]: VG cinder-volumes finished Oct 12 14:32:25 np0005481648.novalocal sudo[89467]: pam_unix(sudo:session): session closed for user root Oct 12 14:32:25 np0005481648.novalocal systemd[1]: session-c36.scope: Deactivated successfully. Oct 12 14:32:26 np0005481648.novalocal sudo[89528]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf privsep-helper --config-file /etc/glance/glance-image-import.conf --config-file /etc/glance/glance-api.conf --privsep_context os_brick.privileged.default --privsep_sock_path /tmp/tmpll5jy_91/privsep.sock Oct 12 14:32:26 np0005481648.novalocal systemd[1]: Started Session c37 of User root. Oct 12 14:32:26 np0005481648.novalocal sudo[89528]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Oct 12 14:32:27 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 75ba2f2b-b1f0-4e63-be63-acadc8e42a28 Oct 12 14:32:27 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 12 14:32:27 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 875f4aa1-fffb-41f2-adf0-dbbe9853c9a2 Oct 12 14:32:27 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 12 14:32:27 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 84438904-ac82-4875-be3d-66a902591683 Oct 12 14:32:27 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 12 14:32:27 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 539d174a-00ae-462a-8b0b-7fef69181df2 Oct 12 14:32:27 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 12 14:32:27 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l b7186406-04a9-4168-8da7-f87556f6291a Oct 12 14:32:27 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 12 14:32:27 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 6b1045ed-6f90-4e81-a551-0d9b664b0c21 Oct 12 14:32:27 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 12 14:32:27 np0005481648.novalocal sudo[89528]: pam_unix(sudo:session): session closed for user root Oct 12 14:32:27 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l f0c21bd6-7cad-481d-9f77-569086fa870f Oct 12 14:32:28 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:28 np0005481648.novalocal setroubleshoot[89435]: failed to retrieve rpm info for path '/run/blkid/blkid.tab': Oct 12 14:32:28 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l 4068a606-ccbf-40b0-9e4f-025ae9c12b92 Oct 12 14:32:28 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:28 np0005481648.novalocal setroubleshoot[89435]: failed to retrieve rpm info for path '/dev/vda1': Oct 12 14:32:28 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 6a565df5-be98-425c-b05e-f25e80bec98f Oct 12 14:32:28 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:28 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l 778dffbd-e3f4-403f-805e-342f54776bb9 Oct 12 14:32:28 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:28 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l fdc0f88a-9ea6-45e0-a92c-efa8a68b86e8 Oct 12 14:32:28 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:28 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 8d6a2410-f8ed-4faf-93d1-166ff91888da Oct 12 14:32:28 np0005481648.novalocal sudo[89559]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-679f980e-859b-4f86-951a-5a764e8b682c Oct 12 14:32:28 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:28 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l f1d20717-b3a7-485b-ba4c-ede794d343f8 Oct 12 14:32:28 np0005481648.novalocal systemd[1]: Started Session c38 of User root. Oct 12 14:32:28 np0005481648.novalocal sudo[89559]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:32:28 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:28 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l 2b6d0495-bc0b-43ff-8285-37b5f9e333e9 Oct 12 14:32:28 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:28 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 2606724d-6629-46be-bc6a-1677d5a1beb3 Oct 12 14:32:28 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:28 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l 73c29139-63b1-4eae-8c9a-db9dd049b91e Oct 12 14:32:28 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:28 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from 'read, write, open' accesses on the file /run/blkid/blkid.tab-mA0KRi. For complete SELinux messages run: sealert -l 57df99dc-f8a6-411a-a33b-446e6670d6f6 Oct 12 14:32:28 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from 'read, write, open' accesses on the file /run/blkid/blkid.tab-mA0KRi. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read write open access on the blkid.tab-mA0KRi file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:28 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-mA0KRi. For complete SELinux messages run: sealert -l 1a4d59a1-96c3-4925-8525-9c54ff90795b Oct 12 14:32:28 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-mA0KRi. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-mA0KRi file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:28 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l 958b93fd-27ea-40dc-bcbd-f0fa26efc65b Oct 12 14:32:28 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:28 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l dcfb8666-2637-4c65-a16a-6b5c4f59b8ec Oct 12 14:32:28 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:28 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l 6618c608-7871-4303-9a60-edab5c448fa7 Oct 12 14:32:28 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:28 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l 4ba0903d-49e9-484e-b52f-82ba95aa6f09 Oct 12 14:32:28 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:28 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). For complete SELinux messages run: sealert -l 5db0bd8c-880a-4599-9e65-6eeb3e16e91b Oct 12 14:32:28 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:28 np0005481648.novalocal sudo[89559]: pam_unix(sudo:session): session closed for user root Oct 12 14:32:28 np0005481648.novalocal systemd[1]: session-c38.scope: Deactivated successfully. Oct 12 14:32:28 np0005481648.novalocal sudo[89563]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-679f980e-859b-4f86-951a-5a764e8b682c iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c PRcmPZ6RReR8KeFZb8qv pNz7as7k4FKQQuk6 False -p3260 -a::1 Oct 12 14:32:28 np0005481648.novalocal systemd[1]: Started Session c39 of User root. Oct 12 14:32:28 np0005481648.novalocal sudo[89563]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:32:29 np0005481648.novalocal sudo[89563]: pam_unix(sudo:session): session closed for user root Oct 12 14:32:29 np0005481648.novalocal systemd[1]: session-c39.scope: Deactivated successfully. Oct 12 14:32:29 np0005481648.novalocal sudo[89579]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 12 14:32:29 np0005481648.novalocal systemd[1]: Started Session c40 of User root. Oct 12 14:32:29 np0005481648.novalocal sudo[89579]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:32:29 np0005481648.novalocal sudo[89579]: pam_unix(sudo:session): session closed for user root Oct 12 14:32:29 np0005481648.novalocal systemd[1]: session-c40.scope: Deactivated successfully. Oct 12 14:32:29 np0005481648.novalocal sudo[89584]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 12 14:32:29 np0005481648.novalocal systemd[1]: Started Session c41 of User root. Oct 12 14:32:29 np0005481648.novalocal sudo[89584]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:32:30 np0005481648.novalocal sudo[89584]: pam_unix(sudo:session): session closed for user root Oct 12 14:32:30 np0005481648.novalocal systemd[1]: session-c41.scope: Deactivated successfully. Oct 12 14:32:30 np0005481648.novalocal sudo[89589]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c PRcmPZ6RReR8KeFZb8qv pNz7as7k4FKQQuk6 iqn.1994-05.com.redhat:6c58e158f1b6 Oct 12 14:32:30 np0005481648.novalocal systemd[1]: Started Session c42 of User root. Oct 12 14:32:30 np0005481648.novalocal sudo[89589]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:32:30 np0005481648.novalocal sudo[89589]: pam_unix(sudo:session): session closed for user root Oct 12 14:32:30 np0005481648.novalocal systemd[1]: session-c42.scope: Deactivated successfully. Oct 12 14:32:30 np0005481648.novalocal sudo[89594]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 12 14:32:30 np0005481648.novalocal systemd[1]: Started Session c43 of User root. Oct 12 14:32:30 np0005481648.novalocal sudo[89594]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:32:31 np0005481648.novalocal sudo[89594]: pam_unix(sudo:session): session closed for user root Oct 12 14:32:31 np0005481648.novalocal systemd[1]: session-c43.scope: Deactivated successfully. Oct 12 14:32:31 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l ba220fa6-116b-4618-9cd1-aa9d19b04a90 Oct 12 14:32:31 np0005481648.novalocal kernel: iscsi: registered transport (tcp) Oct 12 14:32:31 np0005481648.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Oct 12 14:32:31 np0005481648.novalocal iscsid[71266]: iscsid: Connection1:0 to [target: iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c, portal: ::1,3260] through [iface: default] is operational now Oct 12 14:32:31 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 12 14:32:31 np0005481648.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Oct 12 14:32:31 np0005481648.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Oct 12 14:32:31 np0005481648.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405f6e2d8c90db44f35a35aa6908 port group 0 rel port 1 Oct 12 14:32:31 np0005481648.novalocal kernel: scsi 2:0:0:0: Attached scsi generic sg1 type 0 Oct 12 14:32:31 np0005481648.novalocal kernel: scsi 2:0:0:0: alua: transition timeout set to 60 seconds Oct 12 14:32:31 np0005481648.novalocal kernel: scsi 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Oct 12 14:32:31 np0005481648.novalocal setroubleshoot[89435]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Oct 12 14:32:31 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Oct 12 14:32:31 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Oct 12 14:32:31 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Oct 12 14:32:31 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Oct 12 14:32:31 np0005481648.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 12 14:32:31 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Oct 12 14:32:31 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Oct 12 14:32:31 np0005481648.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 12 14:32:31 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Oct 12 14:32:31 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l ec263c55-b3b4-4e58-81a5-c4d69c5d1f8a Oct 12 14:32:31 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 12 14:32:31 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l c2638311-2b6b-42e9-9f2a-e2e5fd2c6a2d Oct 12 14:32:31 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 12 14:32:31 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 00522d6b-80dd-4c7a-9b3a-d02d3e5f5998 Oct 12 14:32:31 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:31 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l a6197c96-1e13-44d3-bbd1-f5a281bcb432 Oct 12 14:32:31 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:31 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 401857b9-7d0e-47e4-b46d-1ee05162778c Oct 12 14:32:31 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:31 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 61602dd4-fb4f-43d5-9117-f402500c03e0 Oct 12 14:32:31 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:31 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 09ae8cfc-d2b1-4152-8332-53dbb11b21bc Oct 12 14:32:31 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:31 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 4d868040-debf-426c-8efc-cb757d051ef1 Oct 12 14:32:31 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:31 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l b0c39bf6-0303-43d5-9362-d5b3d50ce5c1 Oct 12 14:32:31 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:31 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l c3ffead9-2472-43c4-af6a-8110912f05c4 Oct 12 14:32:31 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:31 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l e4631b0e-c2fe-4892-8aa4-cc8b6b7365e6 Oct 12 14:32:31 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:32 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l eac3db55-cc11-470b-ae39-dcabf4b57222 Oct 12 14:32:32 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:32 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 4f818d54-aff1-457f-9d32-7f1321cc9380 Oct 12 14:32:32 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:32 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l 63d433c6-1b2a-46a2-9d30-a0b3cfb9ded7 Oct 12 14:32:32 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:32 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l fbc50ccd-8abc-40d1-8bbb-97dbf44f335c Oct 12 14:32:32 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:32 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c/::1,3260. For complete SELinux messages run: sealert -l 21043552-9c33-4bc9-aeca-dd1b9f33541b Oct 12 14:32:32 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:32 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c/::1,3260. For complete SELinux messages run: sealert -l cc8e9f08-5b33-4da8-a6c3-b70097c48e6f Oct 12 14:32:32 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:32 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 9698e754-32f8-4810-9a9c-d24864c27320 Oct 12 14:32:32 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:32 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l a6197c96-1e13-44d3-bbd1-f5a281bcb432 Oct 12 14:32:32 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:32 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 401857b9-7d0e-47e4-b46d-1ee05162778c Oct 12 14:32:32 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:32 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 4d868040-debf-426c-8efc-cb757d051ef1 Oct 12 14:32:32 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:32 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l e4631b0e-c2fe-4892-8aa4-cc8b6b7365e6 Oct 12 14:32:32 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:32 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c/::1,3260. For complete SELinux messages run: sealert -l cc8e9f08-5b33-4da8-a6c3-b70097c48e6f Oct 12 14:32:32 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:32 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 9698e754-32f8-4810-9a9c-d24864c27320 Oct 12 14:32:32 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:32 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c/::1,3260. For complete SELinux messages run: sealert -l 73b18272-db92-49b9-8659-02b5b6b75364 Oct 12 14:32:32 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:32 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l f5cf4556-c270-452f-a4b7-205786b57810 Oct 12 14:32:32 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:32 np0005481648.novalocal setroubleshoot[89435]: failed to retrieve rpm info for path '/sys/class/scsi_host/host2/scan': Oct 12 14:32:32 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 92d54210-812c-4741-a1e0-eca1af603600 Oct 12 14:32:32 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 12 14:32:32 np0005481648.novalocal sudo[89651]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Oct 12 14:32:32 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 64b66845-3656-4fc4-9b92-ef21d08812db Oct 12 14:32:32 np0005481648.novalocal systemd[1]: Started Session c44 of User root. Oct 12 14:32:32 np0005481648.novalocal sudo[89651]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Oct 12 14:32:32 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 12 14:32:33 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 2a9cea8e-eba0-4b87-8923-dd58722e28eb Oct 12 14:32:33 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 12 14:32:33 np0005481648.novalocal setroubleshoot[89435]: failed to retrieve rpm info for path '/dev/sda': Oct 12 14:32:33 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 6a565df5-be98-425c-b05e-f25e80bec98f Oct 12 14:32:33 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:33 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 875f4aa1-fffb-41f2-adf0-dbbe9853c9a2 Oct 12 14:32:33 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 12 14:32:33 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 84438904-ac82-4875-be3d-66a902591683 Oct 12 14:32:33 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 12 14:32:33 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 539d174a-00ae-462a-8b0b-7fef69181df2 Oct 12 14:32:33 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 12 14:32:33 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l b7186406-04a9-4168-8da7-f87556f6291a Oct 12 14:32:33 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 12 14:32:33 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 6b1045ed-6f90-4e81-a551-0d9b664b0c21 Oct 12 14:32:33 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 12 14:32:33 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 75ba2f2b-b1f0-4e63-be63-acadc8e42a28 Oct 12 14:32:33 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 12 14:32:33 np0005481648.novalocal sudo[89651]: pam_unix(sudo:session): session closed for user root Oct 12 14:32:33 np0005481648.novalocal systemd[1]: session-c44.scope: Deactivated successfully. Oct 12 14:32:33 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l 3a15a085-f59a-4c6a-bd97-12889c5d4c6d Oct 12 14:32:33 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Oct 12 14:32:33 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. For complete SELinux messages run: sealert -l 7ef0d836-6adc-40fc-b306-ec4b32140aa5 Oct 12 14:32:33 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 12 14:32:33 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l fdc0f88a-9ea6-45e0-a92c-efa8a68b86e8 Oct 12 14:32:33 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:34 np0005481648.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 12 14:32:34 np0005481648.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 12 14:32:34 np0005481648.novalocal kernel: GPT:229375 != 2097151 Oct 12 14:32:34 np0005481648.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Oct 12 14:32:34 np0005481648.novalocal kernel: GPT:229375 != 2097151 Oct 12 14:32:34 np0005481648.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Oct 12 14:32:34 np0005481648.novalocal kernel: sda: sda1 sda15 Oct 12 14:32:34 np0005481648.novalocal sudo[89663]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Oct 12 14:32:34 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 8d6a2410-f8ed-4faf-93d1-166ff91888da Oct 12 14:32:34 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:34 np0005481648.novalocal systemd[1]: Started Session c45 of User root. Oct 12 14:32:34 np0005481648.novalocal sudo[89663]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Oct 12 14:32:34 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 6a565df5-be98-425c-b05e-f25e80bec98f Oct 12 14:32:34 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:34 np0005481648.novalocal sudo[89663]: pam_unix(sudo:session): session closed for user root Oct 12 14:32:34 np0005481648.novalocal systemd[1]: session-c45.scope: Deactivated successfully. Oct 12 14:32:34 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l 3a15a085-f59a-4c6a-bd97-12889c5d4c6d Oct 12 14:32:34 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Oct 12 14:32:34 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Oct 12 14:32:34 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 00522d6b-80dd-4c7a-9b3a-d02d3e5f5998 Oct 12 14:32:34 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:34 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. For complete SELinux messages run: sealert -l b0c39bf6-0303-43d5-9362-d5b3d50ce5c1 Oct 12 14:32:34 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the send_targets directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:34 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 61602dd4-fb4f-43d5-9117-f402500c03e0 Oct 12 14:32:34 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:34 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 09ae8cfc-d2b1-4152-8332-53dbb11b21bc Oct 12 14:32:34 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:34 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:34 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l c3ffead9-2472-43c4-af6a-8110912f05c4 Oct 12 14:32:34 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 12 14:32:34 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l ba220fa6-116b-4618-9cd1-aa9d19b04a90 Oct 12 14:32:34 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 12 14:32:34 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l ec263c55-b3b4-4e58-81a5-c4d69c5d1f8a Oct 12 14:32:34 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l c2638311-2b6b-42e9-9f2a-e2e5fd2c6a2d Oct 12 14:32:34 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 12 14:32:34 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l 778dffbd-e3f4-403f-805e-342f54776bb9 Oct 12 14:32:34 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:34 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l fdc0f88a-9ea6-45e0-a92c-efa8a68b86e8 Oct 12 14:32:34 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:34 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 8d6a2410-f8ed-4faf-93d1-166ff91888da Oct 12 14:32:34 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:35 np0005481648.novalocal kernel: scsi 2:0:0:0: alua: Detached Oct 12 14:32:35 np0005481648.novalocal iscsid[71266]: iscsid: Connection1:0 to [target: iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c, portal: ::1,3260] through [iface: default] is shutdown. Oct 12 14:32:35 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/tee from append access on the file delete. For complete SELinux messages run: sealert -l 2a9cea8e-eba0-4b87-8923-dd58722e28eb Oct 12 14:32:35 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/tee from append access on the file delete. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the delete file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 12 14:32:35 np0005481648.novalocal sudo[89706]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c iqn.1994-05.com.redhat:6c58e158f1b6 Oct 12 14:32:35 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c. For complete SELinux messages run: sealert -l eac3db55-cc11-470b-ae39-dcabf4b57222 Oct 12 14:32:35 np0005481648.novalocal systemd[1]: Started Session c46 of User root. Oct 12 14:32:35 np0005481648.novalocal sudo[89706]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:32:35 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:35 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l cb9ec29e-1279-4555-8329-572e5cab3852 Oct 12 14:32:35 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:35 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 8c0c66d4-b763-40d1-bcec-2b8ec0f338a5 Oct 12 14:32:35 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:35 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c. For complete SELinux messages run: sealert -l 12085319-fb02-4e36-a535-32e76142c068 Oct 12 14:32:35 np0005481648.novalocal sudo[89711]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:32:35 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:35 np0005481648.novalocal systemd[1]: Started Session c47 of User root. Oct 12 14:32:35 np0005481648.novalocal sudo[89711]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:32:35 np0005481648.novalocal sudo[89711]: pam_unix(sudo:session): session closed for user root Oct 12 14:32:35 np0005481648.novalocal systemd[1]: session-c47.scope: Deactivated successfully. Oct 12 14:32:35 np0005481648.novalocal sudo[89717]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:32:35 np0005481648.novalocal systemd[1]: Started Session c48 of User root. Oct 12 14:32:35 np0005481648.novalocal sudo[89717]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:32:35 np0005481648.novalocal sudo[89706]: pam_unix(sudo:session): session closed for user root Oct 12 14:32:35 np0005481648.novalocal systemd[1]: session-c46.scope: Deactivated successfully. Oct 12 14:32:35 np0005481648.novalocal sudo[89720]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 12 14:32:35 np0005481648.novalocal systemd[1]: Started Session c49 of User root. Oct 12 14:32:35 np0005481648.novalocal sudo[89720]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:32:36 np0005481648.novalocal sudo[89717]: pam_unix(sudo:session): session closed for user root Oct 12 14:32:36 np0005481648.novalocal systemd[1]: session-c48.scope: Deactivated successfully. Oct 12 14:32:36 np0005481648.novalocal sudo[89725]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:32:36 np0005481648.novalocal systemd[1]: Started Session c50 of User root. Oct 12 14:32:36 np0005481648.novalocal sudo[89725]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:32:36 np0005481648.novalocal sudo[89720]: pam_unix(sudo:session): session closed for user root Oct 12 14:32:36 np0005481648.novalocal systemd[1]: session-c49.scope: Deactivated successfully. Oct 12 14:32:36 np0005481648.novalocal sudo[89729]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 12 14:32:36 np0005481648.novalocal systemd[1]: Started Session c51 of User root. Oct 12 14:32:36 np0005481648.novalocal sudo[89729]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:32:36 np0005481648.novalocal sudo[89725]: pam_unix(sudo:session): session closed for user root Oct 12 14:32:36 np0005481648.novalocal systemd[1]: session-c50.scope: Deactivated successfully. Oct 12 14:32:36 np0005481648.novalocal sudo[89733]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:32:36 np0005481648.novalocal systemd[1]: Started Session c52 of User root. Oct 12 14:32:36 np0005481648.novalocal sudo[89733]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:32:36 np0005481648.novalocal sudo[89733]: pam_unix(sudo:session): session closed for user root Oct 12 14:32:36 np0005481648.novalocal systemd[1]: session-c52.scope: Deactivated successfully. Oct 12 14:32:36 np0005481648.novalocal sudo[89729]: pam_unix(sudo:session): session closed for user root Oct 12 14:32:36 np0005481648.novalocal systemd[1]: session-c51.scope: Deactivated successfully. Oct 12 14:32:36 np0005481648.novalocal sudo[89739]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c Oct 12 14:32:36 np0005481648.novalocal systemd[1]: Started Session c53 of User root. Oct 12 14:32:36 np0005481648.novalocal sudo[89739]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:32:37 np0005481648.novalocal sudo[89739]: pam_unix(sudo:session): session closed for user root Oct 12 14:32:37 np0005481648.novalocal systemd[1]: session-c53.scope: Deactivated successfully. Oct 12 14:32:37 np0005481648.novalocal sudo[89744]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 12 14:32:37 np0005481648.novalocal systemd[1]: Started Session c54 of User root. Oct 12 14:32:37 np0005481648.novalocal sudo[89744]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:32:37 np0005481648.novalocal sudo[89744]: pam_unix(sudo:session): session closed for user root Oct 12 14:32:37 np0005481648.novalocal systemd[1]: session-c54.scope: Deactivated successfully. Oct 12 14:32:43 np0005481648.novalocal sudo[89760]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-cd32a02c-b6bf-4905-84f5-8b8c72f7c7ec cinder-volumes/cinder-volumes-pool Oct 12 14:32:43 np0005481648.novalocal systemd[1]: Started Session c55 of User root. Oct 12 14:32:43 np0005481648.novalocal sudo[89760]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:32:43 np0005481648.novalocal lvm[89771]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 12 14:32:43 np0005481648.novalocal lvm[89771]: VG cinder-volumes finished Oct 12 14:32:43 np0005481648.novalocal sudo[89760]: pam_unix(sudo:session): session closed for user root Oct 12 14:32:43 np0005481648.novalocal systemd[1]: session-c55.scope: Deactivated successfully. Oct 12 14:32:44 np0005481648.novalocal sudo[89775]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf privsep-helper --config-file /etc/glance/glance-image-import.conf --config-file /etc/glance/glance-api.conf --privsep_context os_brick.privileged.default --privsep_sock_path /tmp/tmp57bwbfgf/privsep.sock Oct 12 14:32:44 np0005481648.novalocal systemd[1]: Started Session c56 of User root. Oct 12 14:32:44 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 75ba2f2b-b1f0-4e63-be63-acadc8e42a28 Oct 12 14:32:44 np0005481648.novalocal sudo[89775]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Oct 12 14:32:44 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 12 14:32:44 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 875f4aa1-fffb-41f2-adf0-dbbe9853c9a2 Oct 12 14:32:44 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 12 14:32:44 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 84438904-ac82-4875-be3d-66a902591683 Oct 12 14:32:44 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 12 14:32:44 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 539d174a-00ae-462a-8b0b-7fef69181df2 Oct 12 14:32:44 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 12 14:32:44 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l b7186406-04a9-4168-8da7-f87556f6291a Oct 12 14:32:44 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 12 14:32:44 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 6b1045ed-6f90-4e81-a551-0d9b664b0c21 Oct 12 14:32:44 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 12 14:32:45 np0005481648.novalocal sudo[89775]: pam_unix(sudo:session): session closed for user root Oct 12 14:32:45 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l fbcf3108-0802-457e-8b31-62feb526a1fc Oct 12 14:32:45 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:45 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l c5ce796b-a401-4a0a-9755-c7ec50836b54 Oct 12 14:32:45 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:45 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 6a565df5-be98-425c-b05e-f25e80bec98f Oct 12 14:32:45 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:45 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l 778dffbd-e3f4-403f-805e-342f54776bb9 Oct 12 14:32:45 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:45 np0005481648.novalocal sudo[89797]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-cd32a02c-b6bf-4905-84f5-8b8c72f7c7ec Oct 12 14:32:45 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l fdc0f88a-9ea6-45e0-a92c-efa8a68b86e8 Oct 12 14:32:45 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:45 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 8d6a2410-f8ed-4faf-93d1-166ff91888da Oct 12 14:32:45 np0005481648.novalocal systemd[1]: Started Session c57 of User root. Oct 12 14:32:45 np0005481648.novalocal sudo[89797]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:32:45 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:45 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l 31732ae3-5ba9-48d5-af17-0564a65f58ec Oct 12 14:32:45 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:45 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l 2b6d0495-bc0b-43ff-8285-37b5f9e333e9 Oct 12 14:32:45 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:45 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 2606724d-6629-46be-bc6a-1677d5a1beb3 Oct 12 14:32:45 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:45 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l 73c29139-63b1-4eae-8c9a-db9dd049b91e Oct 12 14:32:45 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:45 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-Ucw5r2. For complete SELinux messages run: sealert -l 1a4d59a1-96c3-4925-8525-9c54ff90795b Oct 12 14:32:45 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-Ucw5r2. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-Ucw5r2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:45 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l 958b93fd-27ea-40dc-bcbd-f0fa26efc65b Oct 12 14:32:45 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:45 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l 5db0bd8c-880a-4599-9e65-6eeb3e16e91b Oct 12 14:32:45 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. blkid.tab.old default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v blkid.tab.old ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:45 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l a8331c79-f0f8-464b-866c-6672bb9646f9 Oct 12 14:32:45 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:45 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l 4ba0903d-49e9-484e-b52f-82ba95aa6f09 Oct 12 14:32:45 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:45 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). For complete SELinux messages run: sealert -l dcfb8666-2637-4c65-a16a-6b5c4f59b8ec Oct 12 14:32:45 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:46 np0005481648.novalocal sudo[89797]: pam_unix(sudo:session): session closed for user root Oct 12 14:32:46 np0005481648.novalocal systemd[1]: session-c57.scope: Deactivated successfully. Oct 12 14:32:46 np0005481648.novalocal sudo[89801]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-cd32a02c-b6bf-4905-84f5-8b8c72f7c7ec iqn.2010-10.org.openstack:volume-cd32a02c-b6bf-4905-84f5-8b8c72f7c7ec zRpDgeqhzoLPFA2QKP72 ENG9nDvVwncHAz3E False -p3260 -a::1 Oct 12 14:32:46 np0005481648.novalocal systemd[1]: Started Session c58 of User root. Oct 12 14:32:46 np0005481648.novalocal sudo[89801]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:32:46 np0005481648.novalocal sudo[89801]: pam_unix(sudo:session): session closed for user root Oct 12 14:32:46 np0005481648.novalocal systemd[1]: session-c58.scope: Deactivated successfully. Oct 12 14:32:46 np0005481648.novalocal sudo[89807]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 12 14:32:46 np0005481648.novalocal systemd[1]: Started Session c59 of User root. Oct 12 14:32:46 np0005481648.novalocal sudo[89807]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:32:47 np0005481648.novalocal sudo[89807]: pam_unix(sudo:session): session closed for user root Oct 12 14:32:47 np0005481648.novalocal systemd[1]: session-c59.scope: Deactivated successfully. Oct 12 14:32:47 np0005481648.novalocal sudo[89812]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 12 14:32:47 np0005481648.novalocal systemd[1]: Started Session c60 of User root. Oct 12 14:32:47 np0005481648.novalocal sudo[89812]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:32:47 np0005481648.novalocal sudo[89812]: pam_unix(sudo:session): session closed for user root Oct 12 14:32:47 np0005481648.novalocal systemd[1]: session-c60.scope: Deactivated successfully. Oct 12 14:32:47 np0005481648.novalocal sudo[89817]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-cd32a02c-b6bf-4905-84f5-8b8c72f7c7ec zRpDgeqhzoLPFA2QKP72 ENG9nDvVwncHAz3E iqn.1994-05.com.redhat:6c58e158f1b6 Oct 12 14:32:47 np0005481648.novalocal systemd[1]: Started Session c61 of User root. Oct 12 14:32:47 np0005481648.novalocal sudo[89817]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:32:48 np0005481648.novalocal sudo[89817]: pam_unix(sudo:session): session closed for user root Oct 12 14:32:48 np0005481648.novalocal systemd[1]: session-c61.scope: Deactivated successfully. Oct 12 14:32:48 np0005481648.novalocal sudo[89822]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 12 14:32:48 np0005481648.novalocal systemd[1]: Started Session c62 of User root. Oct 12 14:32:48 np0005481648.novalocal sudo[89822]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:32:48 np0005481648.novalocal sudo[89822]: pam_unix(sudo:session): session closed for user root Oct 12 14:32:48 np0005481648.novalocal systemd[1]: session-c62.scope: Deactivated successfully. Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l ba220fa6-116b-4618-9cd1-aa9d19b04a90 Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 12 14:32:49 np0005481648.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Oct 12 14:32:49 np0005481648.novalocal iscsid[71266]: iscsid: Connection2:0 to [target: iqn.2010-10.org.openstack:volume-cd32a02c-b6bf-4905-84f5-8b8c72f7c7ec, portal: ::1,3260] through [iface: default] is operational now Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l ec263c55-b3b4-4e58-81a5-c4d69c5d1f8a Oct 12 14:32:49 np0005481648.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Oct 12 14:32:49 np0005481648.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Oct 12 14:32:49 np0005481648.novalocal kernel: scsi 2:0:0:0: alua: device naa.600140567646eb13f114cd48b6808ee5 port group 0 rel port 1 Oct 12 14:32:49 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Oct 12 14:32:49 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Oct 12 14:32:49 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Oct 12 14:32:49 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Oct 12 14:32:49 np0005481648.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 12 14:32:49 np0005481648.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Oct 12 14:32:49 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Oct 12 14:32:49 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Oct 12 14:32:49 np0005481648.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 12 14:32:49 np0005481648.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Oct 12 14:32:49 np0005481648.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Oct 12 14:32:49 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l c2638311-2b6b-42e9-9f2a-e2e5fd2c6a2d Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 00522d6b-80dd-4c7a-9b3a-d02d3e5f5998 Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l a6197c96-1e13-44d3-bbd1-f5a281bcb432 Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 401857b9-7d0e-47e4-b46d-1ee05162778c Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 61602dd4-fb4f-43d5-9117-f402500c03e0 Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 09ae8cfc-d2b1-4152-8332-53dbb11b21bc Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 4d868040-debf-426c-8efc-cb757d051ef1 Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l b0c39bf6-0303-43d5-9362-d5b3d50ce5c1 Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l c3ffead9-2472-43c4-af6a-8110912f05c4 Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l e4631b0e-c2fe-4892-8aa4-cc8b6b7365e6 Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l eac3db55-cc11-470b-ae39-dcabf4b57222 Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l a8d08d8f-406e-439e-9e8a-7ec7a8c08d8f Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l 63d433c6-1b2a-46a2-9d30-a0b3cfb9ded7 Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l fbc50ccd-8abc-40d1-8bbb-97dbf44f335c Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-cd32a02c-b6bf-4905-84f5-8b8c72f7c7ec/::1,3260. For complete SELinux messages run: sealert -l 21043552-9c33-4bc9-aeca-dd1b9f33541b Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-cd32a02c-b6bf-4905-84f5-8b8c72f7c7ec/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-cd32a02c-b6bf-4905-84f5-8b8c72f7c7ec/::1,3260. For complete SELinux messages run: sealert -l cc8e9f08-5b33-4da8-a6c3-b70097c48e6f Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-cd32a02c-b6bf-4905-84f5-8b8c72f7c7ec/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 9698e754-32f8-4810-9a9c-d24864c27320 Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iscsi. For complete SELinux messages run: sealert -l 61602dd4-fb4f-43d5-9117-f402500c03e0 Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iscsi. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iscsi default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iscsi ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iscsi directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l c3ffead9-2472-43c4-af6a-8110912f05c4 Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 09ae8cfc-d2b1-4152-8332-53dbb11b21bc Oct 12 14:32:49 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:50 np0005481648.novalocal sudo[89877]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Oct 12 14:32:50 np0005481648.novalocal systemd[1]: Started Session c63 of User root. Oct 12 14:32:50 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 92d54210-812c-4741-a1e0-eca1af603600 Oct 12 14:32:50 np0005481648.novalocal sudo[89877]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Oct 12 14:32:50 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 12 14:32:50 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 64b66845-3656-4fc4-9b92-ef21d08812db Oct 12 14:32:50 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 12 14:32:50 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 2a9cea8e-eba0-4b87-8923-dd58722e28eb Oct 12 14:32:50 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 12 14:32:50 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 6a565df5-be98-425c-b05e-f25e80bec98f Oct 12 14:32:50 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:50 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 75ba2f2b-b1f0-4e63-be63-acadc8e42a28 Oct 12 14:32:50 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 12 14:32:50 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 875f4aa1-fffb-41f2-adf0-dbbe9853c9a2 Oct 12 14:32:50 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 12 14:32:50 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 84438904-ac82-4875-be3d-66a902591683 Oct 12 14:32:50 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 12 14:32:50 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 539d174a-00ae-462a-8b0b-7fef69181df2 Oct 12 14:32:50 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 12 14:32:50 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l b7186406-04a9-4168-8da7-f87556f6291a Oct 12 14:32:50 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 12 14:32:50 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 6b1045ed-6f90-4e81-a551-0d9b664b0c21 Oct 12 14:32:50 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 12 14:32:50 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l 3a15a085-f59a-4c6a-bd97-12889c5d4c6d Oct 12 14:32:50 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Oct 12 14:32:50 np0005481648.novalocal sudo[89877]: pam_unix(sudo:session): session closed for user root Oct 12 14:32:50 np0005481648.novalocal systemd[1]: session-c63.scope: Deactivated successfully. Oct 12 14:32:50 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. For complete SELinux messages run: sealert -l 7ef0d836-6adc-40fc-b306-ec4b32140aa5 Oct 12 14:32:50 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 12 14:32:50 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l fdc0f88a-9ea6-45e0-a92c-efa8a68b86e8 Oct 12 14:32:50 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:51 np0005481648.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 12 14:32:51 np0005481648.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 12 14:32:51 np0005481648.novalocal kernel: GPT:229375 != 2097151 Oct 12 14:32:51 np0005481648.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Oct 12 14:32:51 np0005481648.novalocal kernel: GPT:229375 != 2097151 Oct 12 14:32:51 np0005481648.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Oct 12 14:32:51 np0005481648.novalocal kernel: sda: sda1 sda15 Oct 12 14:32:51 np0005481648.novalocal sudo[89884]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Oct 12 14:32:51 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 8d6a2410-f8ed-4faf-93d1-166ff91888da Oct 12 14:32:51 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:51 np0005481648.novalocal systemd[1]: Started Session c64 of User root. Oct 12 14:32:51 np0005481648.novalocal sudo[89884]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Oct 12 14:32:52 np0005481648.novalocal sudo[89884]: pam_unix(sudo:session): session closed for user root Oct 12 14:32:52 np0005481648.novalocal systemd[1]: session-c64.scope: Deactivated successfully. Oct 12 14:32:52 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 00522d6b-80dd-4c7a-9b3a-d02d3e5f5998 Oct 12 14:32:52 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:52 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l a6197c96-1e13-44d3-bbd1-f5a281bcb432 Oct 12 14:32:52 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Oct 12 14:32:52 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:52 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 401857b9-7d0e-47e4-b46d-1ee05162778c Oct 12 14:32:52 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:52 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 4d868040-debf-426c-8efc-cb757d051ef1 Oct 12 14:32:52 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:52 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l e4631b0e-c2fe-4892-8aa4-cc8b6b7365e6 Oct 12 14:32:52 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:52 np0005481648.novalocal kernel: scsi 2:0:0:0: alua: Detached Oct 12 14:32:53 np0005481648.novalocal iscsid[71266]: iscsid: Connection2:0 to [target: iqn.2010-10.org.openstack:volume-cd32a02c-b6bf-4905-84f5-8b8c72f7c7ec, portal: ::1,3260] through [iface: default] is shutdown. Oct 12 14:32:53 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l 778dffbd-e3f4-403f-805e-342f54776bb9 Oct 12 14:32:53 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:32:53 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l cb9ec29e-1279-4555-8329-572e5cab3852 Oct 12 14:32:53 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:53 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 8c0c66d4-b763-40d1-bcec-2b8ec0f338a5 Oct 12 14:32:53 np0005481648.novalocal sudo[89922]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-cd32a02c-b6bf-4905-84f5-8b8c72f7c7ec iqn.1994-05.com.redhat:6c58e158f1b6 Oct 12 14:32:53 np0005481648.novalocal systemd[1]: Started Session c65 of User root. Oct 12 14:32:53 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:53 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-cd32a02c-b6bf-4905-84f5-8b8c72f7c7ec. For complete SELinux messages run: sealert -l 12085319-fb02-4e36-a535-32e76142c068 Oct 12 14:32:53 np0005481648.novalocal sudo[89922]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:32:53 np0005481648.novalocal setroubleshoot[89435]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-cd32a02c-b6bf-4905-84f5-8b8c72f7c7ec. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-cd32a02c-b6bf-4905-84f5-8b8c72f7c7ec directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:32:53 np0005481648.novalocal sudo[89922]: pam_unix(sudo:session): session closed for user root Oct 12 14:32:53 np0005481648.novalocal systemd[1]: session-c65.scope: Deactivated successfully. Oct 12 14:32:53 np0005481648.novalocal sudo[89928]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 12 14:32:53 np0005481648.novalocal systemd[1]: Started Session c66 of User root. Oct 12 14:32:53 np0005481648.novalocal sudo[89928]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:32:54 np0005481648.novalocal sudo[89928]: pam_unix(sudo:session): session closed for user root Oct 12 14:32:54 np0005481648.novalocal systemd[1]: session-c66.scope: Deactivated successfully. Oct 12 14:32:54 np0005481648.novalocal sudo[89933]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 12 14:32:54 np0005481648.novalocal systemd[1]: Started Session c67 of User root. Oct 12 14:32:54 np0005481648.novalocal sudo[89933]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:32:54 np0005481648.novalocal sudo[89933]: pam_unix(sudo:session): session closed for user root Oct 12 14:32:54 np0005481648.novalocal systemd[1]: session-c67.scope: Deactivated successfully. Oct 12 14:32:54 np0005481648.novalocal sudo[89941]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-cd32a02c-b6bf-4905-84f5-8b8c72f7c7ec Oct 12 14:32:54 np0005481648.novalocal systemd[1]: Started Session c68 of User root. Oct 12 14:32:54 np0005481648.novalocal sudo[89941]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:32:55 np0005481648.novalocal sudo[89941]: pam_unix(sudo:session): session closed for user root Oct 12 14:32:55 np0005481648.novalocal systemd[1]: session-c68.scope: Deactivated successfully. Oct 12 14:32:55 np0005481648.novalocal sudo[89946]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 12 14:32:55 np0005481648.novalocal systemd[1]: Started Session c69 of User root. Oct 12 14:32:55 np0005481648.novalocal sudo[89946]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:32:55 np0005481648.novalocal sudo[89946]: pam_unix(sudo:session): session closed for user root Oct 12 14:32:55 np0005481648.novalocal systemd[1]: session-c69.scope: Deactivated successfully. Oct 12 14:33:01 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:33:01 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:33:01 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:33:03 np0005481648.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service: Deactivated successfully. Oct 12 14:33:03 np0005481648.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service: Consumed 1.353s CPU time. Oct 12 14:33:03 np0005481648.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 12 14:33:03 np0005481648.novalocal systemd[1]: setroubleshootd.service: Consumed 5.368s CPU time. Oct 12 14:33:21 np0005481648.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 12 14:33:22 np0005481648.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 12 14:33:23 np0005481648.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service. Oct 12 14:33:24 np0005481648.novalocal setroubleshoot[90031]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/neutron/(null). For complete SELinux messages run: sealert -l 4323dd3c-eab2-43d0-b0a4-6b60c5e0246a Oct 12 14:33:24 np0005481648.novalocal setroubleshoot[90031]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/neutron/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 12 14:33:24 np0005481648.novalocal setroubleshoot[90031]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/neutron/(null). For complete SELinux messages run: sealert -l 0b0d3f89-c537-4c68-a218-99517cabbd98 Oct 12 14:33:24 np0005481648.novalocal setroubleshoot[90031]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/neutron/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 12 14:33:24 np0005481648.novalocal setroubleshoot[90031]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/neutron/(null). For complete SELinux messages run: sealert -l 16d8ba21-51ec-4bc1-beb3-3fe3f6c93435 Oct 12 14:33:24 np0005481648.novalocal setroubleshoot[90031]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/neutron/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 12 14:33:24 np0005481648.novalocal setroubleshoot[90031]: failed to retrieve rpm info for path '/var/lib/neutron/.cache/python-entrypoints/3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2': Oct 12 14:33:24 np0005481648.novalocal setroubleshoot[90031]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/neutron/.cache/python-entrypoints/3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2. For complete SELinux messages run: sealert -l 42fe0c05-b98f-4873-8b25-486b7d118204 Oct 12 14:33:24 np0005481648.novalocal setroubleshoot[90031]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/neutron/.cache/python-entrypoints/3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write open access on the 3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 12 14:33:24 np0005481648.novalocal setroubleshoot[90031]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/neutron/.cache/python-entrypoints/3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2. For complete SELinux messages run: sealert -l 9579bc3d-26f7-44ea-8526-fc3b477c3987 Oct 12 14:33:24 np0005481648.novalocal setroubleshoot[90031]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/neutron/.cache/python-entrypoints/3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the 3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 12 14:33:24 np0005481648.novalocal setroubleshoot[90031]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/neutron/.cache/python-entrypoints/3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2. For complete SELinux messages run: sealert -l f0eb8471-d519-4c02-bfe4-feb271adb674 Oct 12 14:33:24 np0005481648.novalocal setroubleshoot[90031]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/neutron/.cache/python-entrypoints/3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the 3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 12 14:33:27 np0005481648.novalocal setroubleshoot[90031]: SELinux is preventing /usr/sbin/httpd from read access on the file 3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2. For complete SELinux messages run: sealert -l 2c2a7e35-d8f1-4c41-8cd3-5b310767d55c Oct 12 14:33:27 np0005481648.novalocal setroubleshoot[90031]: SELinux is preventing /usr/sbin/httpd from read access on the file 3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed read access on the 3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 12 14:33:35 np0005481648.novalocal sudo[90089]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:33:35 np0005481648.novalocal systemd[1]: Started Session c70 of User root. Oct 12 14:33:35 np0005481648.novalocal sudo[90089]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:33:35 np0005481648.novalocal sudo[90089]: pam_unix(sudo:session): session closed for user root Oct 12 14:33:35 np0005481648.novalocal systemd[1]: session-c70.scope: Deactivated successfully. Oct 12 14:33:35 np0005481648.novalocal sudo[90094]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:33:35 np0005481648.novalocal systemd[1]: Started Session c71 of User root. Oct 12 14:33:35 np0005481648.novalocal sudo[90094]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:33:36 np0005481648.novalocal sudo[90094]: pam_unix(sudo:session): session closed for user root Oct 12 14:33:36 np0005481648.novalocal systemd[1]: session-c71.scope: Deactivated successfully. Oct 12 14:33:36 np0005481648.novalocal sudo[90100]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:33:36 np0005481648.novalocal systemd[1]: Started Session c72 of User root. Oct 12 14:33:36 np0005481648.novalocal sudo[90100]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:33:36 np0005481648.novalocal sudo[90100]: pam_unix(sudo:session): session closed for user root Oct 12 14:33:36 np0005481648.novalocal systemd[1]: session-c72.scope: Deactivated successfully. Oct 12 14:33:36 np0005481648.novalocal sudo[90104]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:33:36 np0005481648.novalocal systemd[1]: Started Session c73 of User root. Oct 12 14:33:36 np0005481648.novalocal sudo[90104]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:33:36 np0005481648.novalocal sudo[90104]: pam_unix(sudo:session): session closed for user root Oct 12 14:33:36 np0005481648.novalocal systemd[1]: session-c73.scope: Deactivated successfully. Oct 12 14:33:37 np0005481648.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service: Deactivated successfully. Oct 12 14:33:37 np0005481648.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service: Consumed 1.284s CPU time. Oct 12 14:33:37 np0005481648.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 12 14:33:37 np0005481648.novalocal systemd[1]: setroubleshootd.service: Consumed 1.536s CPU time. Oct 12 14:33:54 np0005481648.novalocal PackageKit[51392]: daemon quit Oct 12 14:33:54 np0005481648.novalocal systemd[1]: packagekit.service: Deactivated successfully. Oct 12 14:34:01 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:34:01 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:34:01 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:34:35 np0005481648.novalocal sudo[90252]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:34:35 np0005481648.novalocal systemd[1]: Started Session c74 of User root. Oct 12 14:34:35 np0005481648.novalocal sudo[90252]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:34:35 np0005481648.novalocal sudo[90252]: pam_unix(sudo:session): session closed for user root Oct 12 14:34:35 np0005481648.novalocal systemd[1]: session-c74.scope: Deactivated successfully. Oct 12 14:34:35 np0005481648.novalocal sudo[90256]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:34:35 np0005481648.novalocal systemd[1]: Started Session c75 of User root. Oct 12 14:34:35 np0005481648.novalocal sudo[90256]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:34:36 np0005481648.novalocal sudo[90256]: pam_unix(sudo:session): session closed for user root Oct 12 14:34:36 np0005481648.novalocal systemd[1]: session-c75.scope: Deactivated successfully. Oct 12 14:34:36 np0005481648.novalocal sudo[90261]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:34:36 np0005481648.novalocal systemd[1]: Started Session c76 of User root. Oct 12 14:34:36 np0005481648.novalocal sudo[90261]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:34:36 np0005481648.novalocal sudo[90261]: pam_unix(sudo:session): session closed for user root Oct 12 14:34:36 np0005481648.novalocal systemd[1]: session-c76.scope: Deactivated successfully. Oct 12 14:34:36 np0005481648.novalocal sudo[90267]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:34:36 np0005481648.novalocal systemd[1]: Started Session c77 of User root. Oct 12 14:34:36 np0005481648.novalocal sudo[90267]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:34:36 np0005481648.novalocal sudo[90267]: pam_unix(sudo:session): session closed for user root Oct 12 14:34:36 np0005481648.novalocal systemd[1]: session-c77.scope: Deactivated successfully. Oct 12 14:34:51 np0005481648.novalocal sshd-session[90292]: Invalid user support from 78.128.112.74 port 43648 Oct 12 14:34:51 np0005481648.novalocal sshd-session[90292]: Connection closed by invalid user support 78.128.112.74 port 43648 [preauth] Oct 12 14:35:01 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:35:01 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:35:01 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:35:03 np0005481648.novalocal systemd[85684]: Created slice User Background Tasks Slice. Oct 12 14:35:03 np0005481648.novalocal systemd[85684]: Starting Cleanup of User's Temporary Files and Directories... Oct 12 14:35:03 np0005481648.novalocal systemd[85684]: Finished Cleanup of User's Temporary Files and Directories. Oct 12 14:35:19 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:35:19 np0005481648.novalocal systemd-rc-local-generator[90412]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:35:19 np0005481648.novalocal systemd-sysv-generator[90416]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:35:19 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:35:20 np0005481648.novalocal systemd[1]: Starting OpenStack Nova Conductor Server... Oct 12 14:35:22 np0005481648.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 12 14:35:23 np0005481648.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 12 14:35:23 np0005481648.novalocal systemd[1]: Started OpenStack Nova Conductor Server. Oct 12 14:35:23 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:35:23 np0005481648.novalocal systemd-rc-local-generator[90464]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:35:23 np0005481648.novalocal systemd-sysv-generator[90467]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:35:24 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:35:24 np0005481648.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service. Oct 12 14:35:24 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:35:24 np0005481648.novalocal systemd-rc-local-generator[90497]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:35:24 np0005481648.novalocal systemd-sysv-generator[90502]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:35:24 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:35:24 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:35:25 np0005481648.novalocal systemd-sysv-generator[90542]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:35:25 np0005481648.novalocal systemd-rc-local-generator[90538]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:35:25 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:35:25 np0005481648.novalocal systemd[1]: Starting OpenStack Nova Compute Server... Oct 12 14:35:25 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l f60d63ee-cc2a-42cd-aeb8-21948bcb86cd Oct 12 14:35:25 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 12 14:35:25 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l 4055bed2-b541-41b7-b273-8485aeb5d928 Oct 12 14:35:25 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 12 14:35:25 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l c0634f08-8f3c-4daf-9957-d5c4e4f50b4e Oct 12 14:35:25 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 12 14:35:25 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 156cec56-3e20-4d2a-a408-d0f53b94308a Oct 12 14:35:25 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 12 14:35:25 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l ecf090ef-c9da-454a-9a4a-5489592e9992 Oct 12 14:35:25 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 12 14:35:25 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l 2d0258aa-fbd3-4fa5-b18c-7f6d08e6d89e Oct 12 14:35:25 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 12 14:35:25 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l d3915231-0630-490b-bcd0-80b52c67ca99 Oct 12 14:35:25 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 12 14:35:25 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l f4554e5a-15a5-4501-a675-704656efe4f3 Oct 12 14:35:25 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 12 14:35:25 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l 1e295798-a1e8-4f14-bf38-024f3b4bf0d0 Oct 12 14:35:25 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 12 14:35:25 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l fcd5aefd-8b03-45aa-9061-97f2fb5f7a7a Oct 12 14:35:25 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 12 14:35:26 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l 108fa655-c11d-4ae7-a3d5-e533f429af30 Oct 12 14:35:26 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 12 14:35:30 np0005481648.novalocal systemd[1]: Started OpenStack Nova Compute Server. Oct 12 14:35:30 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:35:30 np0005481648.novalocal systemd-rc-local-generator[90594]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:35:30 np0005481648.novalocal systemd-sysv-generator[90597]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:35:30 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:35:30 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:35:30 np0005481648.novalocal systemd-sysv-generator[90625]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:35:30 np0005481648.novalocal systemd-rc-local-generator[90621]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:35:30 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:35:31 np0005481648.novalocal systemd[1]: Starting libvirt QEMU daemon... Oct 12 14:35:31 np0005481648.novalocal systemd[1]: Started libvirt QEMU daemon. Oct 12 14:35:31 np0005481648.novalocal nova-compute[90547]: libvirt: error : internal error: could not initialize domain event timer Oct 12 14:35:31 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:35:31 np0005481648.novalocal systemd-rc-local-generator[90709]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:35:31 np0005481648.novalocal systemd-sysv-generator[90712]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:35:31 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:35:31 np0005481648.novalocal systemd[1]: Starting OpenStack Nova Scheduler Server... Oct 12 14:35:32 np0005481648.novalocal systemd[1]: Listening on libvirt nodedev daemon admin socket. Oct 12 14:35:32 np0005481648.novalocal systemd[1]: Listening on libvirt nodedev daemon read-only socket. Oct 12 14:35:32 np0005481648.novalocal systemd[1]: Starting libvirt nodedev daemon... Oct 12 14:35:32 np0005481648.novalocal systemd[1]: Started libvirt nodedev daemon. Oct 12 14:35:33 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l f60d63ee-cc2a-42cd-aeb8-21948bcb86cd Oct 12 14:35:33 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 12 14:35:33 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l 4055bed2-b541-41b7-b273-8485aeb5d928 Oct 12 14:35:33 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 12 14:35:33 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l c0634f08-8f3c-4daf-9957-d5c4e4f50b4e Oct 12 14:35:33 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 12 14:35:33 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 156cec56-3e20-4d2a-a408-d0f53b94308a Oct 12 14:35:33 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 12 14:35:33 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l ecf090ef-c9da-454a-9a4a-5489592e9992 Oct 12 14:35:33 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 12 14:35:33 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l 2d0258aa-fbd3-4fa5-b18c-7f6d08e6d89e Oct 12 14:35:33 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 12 14:35:33 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l d3915231-0630-490b-bcd0-80b52c67ca99 Oct 12 14:35:33 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 12 14:35:33 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l f4554e5a-15a5-4501-a675-704656efe4f3 Oct 12 14:35:33 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 12 14:35:33 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l 1e295798-a1e8-4f14-bf38-024f3b4bf0d0 Oct 12 14:35:33 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 12 14:35:33 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l fcd5aefd-8b03-45aa-9061-97f2fb5f7a7a Oct 12 14:35:33 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 12 14:35:33 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l 108fa655-c11d-4ae7-a3d5-e533f429af30 Oct 12 14:35:33 np0005481648.novalocal setroubleshoot[90428]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Oct 12 14:35:34 np0005481648.novalocal systemd[1]: Started OpenStack Nova Scheduler Server. Oct 12 14:35:34 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:35:34 np0005481648.novalocal systemd-rc-local-generator[90785]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:35:34 np0005481648.novalocal systemd-sysv-generator[90789]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:35:34 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:35:34 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:35:34 np0005481648.novalocal systemd-sysv-generator[90821]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:35:34 np0005481648.novalocal systemd-rc-local-generator[90817]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:35:34 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:35:35 np0005481648.novalocal sudo[90827]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:35:35 np0005481648.novalocal systemd[1]: Started Session c78 of User root. Oct 12 14:35:35 np0005481648.novalocal sudo[90827]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:35:35 np0005481648.novalocal sudo[90827]: pam_unix(sudo:session): session closed for user root Oct 12 14:35:35 np0005481648.novalocal systemd[1]: session-c78.scope: Deactivated successfully. Oct 12 14:35:35 np0005481648.novalocal sudo[90831]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:35:35 np0005481648.novalocal systemd[1]: Started Session c79 of User root. Oct 12 14:35:35 np0005481648.novalocal sudo[90831]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:35:36 np0005481648.novalocal sudo[90831]: pam_unix(sudo:session): session closed for user root Oct 12 14:35:36 np0005481648.novalocal systemd[1]: session-c79.scope: Deactivated successfully. Oct 12 14:35:36 np0005481648.novalocal sudo[90836]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:35:36 np0005481648.novalocal systemd[1]: Started Session c80 of User root. Oct 12 14:35:36 np0005481648.novalocal sudo[90836]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:35:36 np0005481648.novalocal sudo[90836]: pam_unix(sudo:session): session closed for user root Oct 12 14:35:36 np0005481648.novalocal systemd[1]: session-c80.scope: Deactivated successfully. Oct 12 14:35:36 np0005481648.novalocal sudo[90840]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:35:36 np0005481648.novalocal systemd[1]: Started Session c81 of User root. Oct 12 14:35:36 np0005481648.novalocal sudo[90840]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:35:36 np0005481648.novalocal sudo[90840]: pam_unix(sudo:session): session closed for user root Oct 12 14:35:36 np0005481648.novalocal systemd[1]: session-c81.scope: Deactivated successfully. Oct 12 14:35:43 np0005481648.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service: Deactivated successfully. Oct 12 14:35:43 np0005481648.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service: Consumed 1.249s CPU time. Oct 12 14:35:44 np0005481648.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 12 14:35:44 np0005481648.novalocal systemd[1]: setroubleshootd.service: Consumed 2.151s CPU time. Oct 12 14:36:01 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:36:01 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:36:01 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:36:09 np0005481648.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 12 14:36:10 np0005481648.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 12 14:36:10 np0005481648.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service. Oct 12 14:36:12 np0005481648.novalocal setroubleshoot[90906]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/nova/(null). For complete SELinux messages run: sealert -l 4e334e85-cef7-4dec-8017-91d4fa7e0ad9 Oct 12 14:36:12 np0005481648.novalocal setroubleshoot[90906]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 12 14:36:12 np0005481648.novalocal setroubleshoot[90906]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/nova/(null). For complete SELinux messages run: sealert -l d258f752-dbbd-423f-8c33-a77329ee8d38 Oct 12 14:36:12 np0005481648.novalocal setroubleshoot[90906]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 12 14:36:12 np0005481648.novalocal setroubleshoot[90906]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/nova/(null). For complete SELinux messages run: sealert -l 02fe3f6c-86e1-4c49-a160-e810a451ab00 Oct 12 14:36:12 np0005481648.novalocal setroubleshoot[90906]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 12 14:36:12 np0005481648.novalocal setroubleshoot[90906]: failed to retrieve rpm info for path '/var/lib/nova/.cache/python-entrypoints/3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2': Oct 12 14:36:12 np0005481648.novalocal setroubleshoot[90906]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/nova/.cache/python-entrypoints/3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2. For complete SELinux messages run: sealert -l ab280f39-2dce-4e3d-93e9-b5dea5fbe6dd Oct 12 14:36:12 np0005481648.novalocal setroubleshoot[90906]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/nova/.cache/python-entrypoints/3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write open access on the 3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 12 14:36:12 np0005481648.novalocal setroubleshoot[90906]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2. For complete SELinux messages run: sealert -l c60d2462-46b6-4da3-a345-2f0c0d5f7766 Oct 12 14:36:12 np0005481648.novalocal setroubleshoot[90906]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the 3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 12 14:36:12 np0005481648.novalocal setroubleshoot[90906]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2. For complete SELinux messages run: sealert -l 7843ea70-f101-46c0-a82f-feb917fa203b Oct 12 14:36:12 np0005481648.novalocal setroubleshoot[90906]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the 3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 12 14:36:12 np0005481648.novalocal setroubleshoot[90906]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l 6771e054-6159-4e88-8152-14d3572487b4 Oct 12 14:36:12 np0005481648.novalocal setroubleshoot[90906]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Oct 12 14:36:12 np0005481648.novalocal setroubleshoot[90906]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l dcfa6937-69b8-4396-ae1c-ec52e18be15d Oct 12 14:36:12 np0005481648.novalocal setroubleshoot[90906]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Oct 12 14:36:12 np0005481648.novalocal setroubleshoot[90906]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 34e1e0df-25ae-4b87-8f41-6112bf0b30e8 Oct 12 14:36:12 np0005481648.novalocal setroubleshoot[90906]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Oct 12 14:36:12 np0005481648.novalocal setroubleshoot[90906]: SELinux is preventing /usr/sbin/httpd from read access on the file 3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2. For complete SELinux messages run: sealert -l 530e1825-6600-4d3c-bd7b-3bb3140d93d3 Oct 12 14:36:12 np0005481648.novalocal setroubleshoot[90906]: SELinux is preventing /usr/sbin/httpd from read access on the file 3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed read access on the 3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 12 14:36:13 np0005481648.novalocal setroubleshoot[90906]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l 6771e054-6159-4e88-8152-14d3572487b4 Oct 12 14:36:13 np0005481648.novalocal setroubleshoot[90906]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Oct 12 14:36:13 np0005481648.novalocal setroubleshoot[90906]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l dcfa6937-69b8-4396-ae1c-ec52e18be15d Oct 12 14:36:13 np0005481648.novalocal setroubleshoot[90906]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Oct 12 14:36:14 np0005481648.novalocal setroubleshoot[90906]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 34e1e0df-25ae-4b87-8f41-6112bf0b30e8 Oct 12 14:36:14 np0005481648.novalocal setroubleshoot[90906]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Oct 12 14:36:21 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:36:21 np0005481648.novalocal systemd-sysv-generator[90972]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:36:21 np0005481648.novalocal systemd-rc-local-generator[90969]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:36:21 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:36:21 np0005481648.novalocal systemd[1]: Started OpenStack Octavia Worker service. Oct 12 14:36:21 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:36:21 np0005481648.novalocal systemd-rc-local-generator[91005]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:36:21 np0005481648.novalocal systemd-sysv-generator[91008]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:36:21 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:36:22 np0005481648.novalocal systemd[1]: Reloading. Oct 12 14:36:22 np0005481648.novalocal systemd-rc-local-generator[91035]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 12 14:36:22 np0005481648.novalocal systemd-sysv-generator[91039]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 12 14:36:22 np0005481648.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Oct 12 14:36:24 np0005481648.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service: Deactivated successfully. Oct 12 14:36:24 np0005481648.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service: Consumed 1.317s CPU time. Oct 12 14:36:24 np0005481648.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 12 14:36:24 np0005481648.novalocal systemd[1]: setroubleshootd.service: Consumed 1.747s CPU time. Oct 12 14:36:35 np0005481648.novalocal sudo[91178]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:36:35 np0005481648.novalocal systemd[1]: Started Session c82 of User root. Oct 12 14:36:35 np0005481648.novalocal sudo[91178]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:36:35 np0005481648.novalocal sudo[91178]: pam_unix(sudo:session): session closed for user root Oct 12 14:36:35 np0005481648.novalocal systemd[1]: session-c82.scope: Deactivated successfully. Oct 12 14:36:35 np0005481648.novalocal sudo[91182]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:36:35 np0005481648.novalocal systemd[1]: Started Session c83 of User root. Oct 12 14:36:35 np0005481648.novalocal sudo[91182]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:36:36 np0005481648.novalocal sudo[91182]: pam_unix(sudo:session): session closed for user root Oct 12 14:36:36 np0005481648.novalocal systemd[1]: session-c83.scope: Deactivated successfully. Oct 12 14:36:36 np0005481648.novalocal sudo[91186]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:36:36 np0005481648.novalocal systemd[1]: Started Session c84 of User root. Oct 12 14:36:36 np0005481648.novalocal sudo[91186]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:36:36 np0005481648.novalocal sudo[91186]: pam_unix(sudo:session): session closed for user root Oct 12 14:36:36 np0005481648.novalocal systemd[1]: session-c84.scope: Deactivated successfully. Oct 12 14:36:36 np0005481648.novalocal sudo[91190]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:36:36 np0005481648.novalocal systemd[1]: Started Session c85 of User root. Oct 12 14:36:36 np0005481648.novalocal sudo[91190]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:36:36 np0005481648.novalocal sudo[91190]: pam_unix(sudo:session): session closed for user root Oct 12 14:36:36 np0005481648.novalocal systemd[1]: session-c85.scope: Deactivated successfully. Oct 12 14:36:37 np0005481648.novalocal runuser[91237]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:36:38 np0005481648.novalocal runuser[91237]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:36:38 np0005481648.novalocal runuser[91290]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:36:39 np0005481648.novalocal runuser[91290]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:36:39 np0005481648.novalocal runuser[91347]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:36:40 np0005481648.novalocal runuser[91347]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:37:00 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:37:00 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:37:00 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:37:05 np0005481648.novalocal sudo[91733]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get connection . inactivity_probe Oct 12 14:37:05 np0005481648.novalocal sudo[91733]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:37:05 np0005481648.novalocal sudo[91733]: pam_unix(sudo:session): session closed for user root Oct 12 14:37:05 np0005481648.novalocal sudo[91737]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get connection . inactivity_probe Oct 12 14:37:05 np0005481648.novalocal sudo[91737]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:37:05 np0005481648.novalocal sudo[91737]: pam_unix(sudo:session): session closed for user root Oct 12 14:37:27 np0005481648.novalocal crontab[91836]: (root) LIST (root) Oct 12 14:37:27 np0005481648.novalocal crontab[91837]: (root) LIST (keystone) Oct 12 14:37:27 np0005481648.novalocal crontab[91838]: (root) LIST (cinder) Oct 12 14:37:27 np0005481648.novalocal crontab[91839]: (root) LIST (glance) Oct 12 14:37:27 np0005481648.novalocal crontab[91840]: (root) LIST (nova) Oct 12 14:37:27 np0005481648.novalocal crontab[91841]: (root) LIST (manila) Oct 12 14:37:30 np0005481648.novalocal runuser[91850]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:37:31 np0005481648.novalocal runuser[91850]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:37:31 np0005481648.novalocal runuser[91904]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:37:32 np0005481648.novalocal runuser[91904]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:37:32 np0005481648.novalocal runuser[91956]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:37:32 np0005481648.novalocal runuser[91956]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:37:33 np0005481648.novalocal runuser[92010]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:37:33 np0005481648.novalocal runuser[92010]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:37:33 np0005481648.novalocal runuser[92064]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:37:34 np0005481648.novalocal runuser[92064]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:37:34 np0005481648.novalocal runuser[92117]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:37:35 np0005481648.novalocal runuser[92117]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:37:35 np0005481648.novalocal runuser[92171]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:37:35 np0005481648.novalocal sudo[92179]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:37:35 np0005481648.novalocal systemd[1]: Started Session c86 of User root. Oct 12 14:37:35 np0005481648.novalocal sudo[92179]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:37:35 np0005481648.novalocal sudo[92179]: pam_unix(sudo:session): session closed for user root Oct 12 14:37:35 np0005481648.novalocal systemd[1]: session-c86.scope: Deactivated successfully. Oct 12 14:37:35 np0005481648.novalocal sudo[92220]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:37:35 np0005481648.novalocal systemd[1]: Started Session c87 of User root. Oct 12 14:37:35 np0005481648.novalocal sudo[92220]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:37:36 np0005481648.novalocal runuser[92171]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:37:36 np0005481648.novalocal sudo[92220]: pam_unix(sudo:session): session closed for user root Oct 12 14:37:36 np0005481648.novalocal systemd[1]: session-c87.scope: Deactivated successfully. Oct 12 14:37:36 np0005481648.novalocal sudo[92241]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:37:36 np0005481648.novalocal runuser[92233]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:37:36 np0005481648.novalocal systemd[1]: Started Session c88 of User root. Oct 12 14:37:36 np0005481648.novalocal sudo[92241]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:37:36 np0005481648.novalocal sudo[92241]: pam_unix(sudo:session): session closed for user root Oct 12 14:37:36 np0005481648.novalocal systemd[1]: session-c88.scope: Deactivated successfully. Oct 12 14:37:36 np0005481648.novalocal sudo[92282]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:37:36 np0005481648.novalocal systemd[1]: Started Session c89 of User root. Oct 12 14:37:36 np0005481648.novalocal sudo[92282]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:37:36 np0005481648.novalocal runuser[92233]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:37:36 np0005481648.novalocal runuser[92292]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:37:36 np0005481648.novalocal sudo[92282]: pam_unix(sudo:session): session closed for user root Oct 12 14:37:36 np0005481648.novalocal systemd[1]: session-c89.scope: Deactivated successfully. Oct 12 14:37:37 np0005481648.novalocal runuser[92292]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:37:37 np0005481648.novalocal runuser[92345]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:37:38 np0005481648.novalocal runuser[92345]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:37:39 np0005481648.novalocal runuser[92410]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:37:39 np0005481648.novalocal runuser[92410]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:37:39 np0005481648.novalocal runuser[92467]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:37:40 np0005481648.novalocal runuser[92467]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:37:40 np0005481648.novalocal runuser[92521]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:37:41 np0005481648.novalocal runuser[92521]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:37:41 np0005481648.novalocal runuser[92573]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:37:41 np0005481648.novalocal runuser[92573]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:37:43 np0005481648.novalocal runuser[92637]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:37:43 np0005481648.novalocal runuser[92637]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:37:43 np0005481648.novalocal runuser[92689]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:37:44 np0005481648.novalocal runuser[92689]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:37:45 np0005481648.novalocal virtqemud[90651]: libvirt version: 10.10.0, package: 15.el9 (builder@centos.org, 2025-08-18-13:22:20, ) Oct 12 14:37:45 np0005481648.novalocal virtqemud[90651]: hostname: np0005481648.novalocal Oct 12 14:37:45 np0005481648.novalocal virtqemud[90651]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Oct 12 14:37:46 np0005481648.novalocal virtqemud[90651]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Oct 12 14:37:46 np0005481648.novalocal runuser[92775]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:37:47 np0005481648.novalocal runuser[92775]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:37:47 np0005481648.novalocal runuser[92827]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:37:48 np0005481648.novalocal runuser[92827]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:37:48 np0005481648.novalocal runuser[92888]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:37:49 np0005481648.novalocal runuser[92888]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:37:49 np0005481648.novalocal runuser[92940]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Oct 12 14:37:50 np0005481648.novalocal runuser[92940]: pam_unix(runuser:session): session closed for user rabbitmq Oct 12 14:38:01 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:38:01 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:38:01 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:38:35 np0005481648.novalocal sudo[93126]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:38:35 np0005481648.novalocal systemd[1]: Started Session c90 of User root. Oct 12 14:38:35 np0005481648.novalocal sudo[93126]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:38:35 np0005481648.novalocal sudo[93126]: pam_unix(sudo:session): session closed for user root Oct 12 14:38:35 np0005481648.novalocal systemd[1]: session-c90.scope: Deactivated successfully. Oct 12 14:38:35 np0005481648.novalocal sudo[93130]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:38:35 np0005481648.novalocal systemd[1]: Started Session c91 of User root. Oct 12 14:38:35 np0005481648.novalocal sudo[93130]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:38:36 np0005481648.novalocal sudo[93130]: pam_unix(sudo:session): session closed for user root Oct 12 14:38:36 np0005481648.novalocal systemd[1]: session-c91.scope: Deactivated successfully. Oct 12 14:38:36 np0005481648.novalocal sudo[93134]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:38:36 np0005481648.novalocal systemd[1]: Started Session c92 of User root. Oct 12 14:38:36 np0005481648.novalocal sudo[93134]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:38:36 np0005481648.novalocal sudo[93134]: pam_unix(sudo:session): session closed for user root Oct 12 14:38:36 np0005481648.novalocal systemd[1]: session-c92.scope: Deactivated successfully. Oct 12 14:38:36 np0005481648.novalocal sudo[93141]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:38:36 np0005481648.novalocal systemd[1]: Started Session c93 of User root. Oct 12 14:38:36 np0005481648.novalocal sudo[93141]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:38:36 np0005481648.novalocal sudo[93141]: pam_unix(sudo:session): session closed for user root Oct 12 14:38:36 np0005481648.novalocal systemd[1]: session-c93.scope: Deactivated successfully. Oct 12 14:39:01 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:39:01 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:39:01 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:39:35 np0005481648.novalocal sudo[93319]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:39:35 np0005481648.novalocal systemd[1]: Started Session c94 of User root. Oct 12 14:39:35 np0005481648.novalocal sudo[93319]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:39:35 np0005481648.novalocal sudo[93319]: pam_unix(sudo:session): session closed for user root Oct 12 14:39:35 np0005481648.novalocal systemd[1]: session-c94.scope: Deactivated successfully. Oct 12 14:39:35 np0005481648.novalocal sudo[93324]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:39:35 np0005481648.novalocal systemd[1]: Started Session c95 of User root. Oct 12 14:39:35 np0005481648.novalocal sudo[93324]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:39:36 np0005481648.novalocal sudo[93324]: pam_unix(sudo:session): session closed for user root Oct 12 14:39:36 np0005481648.novalocal systemd[1]: session-c95.scope: Deactivated successfully. Oct 12 14:39:36 np0005481648.novalocal sudo[93328]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:39:36 np0005481648.novalocal systemd[1]: Started Session c96 of User root. Oct 12 14:39:36 np0005481648.novalocal sudo[93328]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:39:36 np0005481648.novalocal sudo[93328]: pam_unix(sudo:session): session closed for user root Oct 12 14:39:36 np0005481648.novalocal systemd[1]: session-c96.scope: Deactivated successfully. Oct 12 14:39:36 np0005481648.novalocal sudo[93335]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:39:36 np0005481648.novalocal systemd[1]: Started Session c97 of User root. Oct 12 14:39:36 np0005481648.novalocal sudo[93335]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:39:36 np0005481648.novalocal sudo[93335]: pam_unix(sudo:session): session closed for user root Oct 12 14:39:36 np0005481648.novalocal systemd[1]: session-c97.scope: Deactivated successfully. Oct 12 14:39:48 np0005481648.novalocal sudo[93368]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /etc/neutron/plugins/ml2/ovn_agent.ini --config-dir /etc/neutron/conf.d/neutron-ovn-agent --privsep_context neutron.privileged.default --privsep_sock_path /tmp/tmp5zx15b0o/privsep.sock Oct 12 14:39:48 np0005481648.novalocal systemd[1]: Started Session c98 of User root. Oct 12 14:39:48 np0005481648.novalocal sudo[93368]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 12 14:39:48 np0005481648.novalocal sshd-session[93365]: Invalid user sol from 209.38.110.19 port 40388 Oct 12 14:39:48 np0005481648.novalocal sshd-session[93365]: Connection closed by invalid user sol 209.38.110.19 port 40388 [preauth] Oct 12 14:39:49 np0005481648.novalocal sudo[93368]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:00 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:40:00 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:40:00 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:40:11 np0005481648.novalocal sudo[93450]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-679f980e-859b-4f86-951a-5a764e8b682c Oct 12 14:40:11 np0005481648.novalocal systemd[1]: Started Session c99 of User root. Oct 12 14:40:11 np0005481648.novalocal sudo[93450]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:12 np0005481648.novalocal sudo[93450]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:12 np0005481648.novalocal systemd[1]: session-c99.scope: Deactivated successfully. Oct 12 14:40:12 np0005481648.novalocal sudo[93454]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate --name volume-5f0eaba0-d764-4cbf-ac18-4a05a9b518e1 --snapshot cinder-volumes/volume-679f980e-859b-4f86-951a-5a764e8b682c Oct 12 14:40:12 np0005481648.novalocal systemd[1]: Started Session c100 of User root. Oct 12 14:40:12 np0005481648.novalocal sudo[93454]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:12 np0005481648.novalocal dmeventd[85941]: No longer monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Oct 12 14:40:12 np0005481648.novalocal dmeventd[85941]: Monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Oct 12 14:40:12 np0005481648.novalocal lvm[93467]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 12 14:40:12 np0005481648.novalocal lvm[93467]: VG cinder-volumes finished Oct 12 14:40:12 np0005481648.novalocal sudo[93454]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:12 np0005481648.novalocal systemd[1]: session-c100.scope: Deactivated successfully. Oct 12 14:40:12 np0005481648.novalocal sudo[93470]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -k n cinder-volumes/volume-5f0eaba0-d764-4cbf-ac18-4a05a9b518e1 Oct 12 14:40:12 np0005481648.novalocal systemd[1]: Started Session c101 of User root. Oct 12 14:40:12 np0005481648.novalocal sudo[93470]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:13 np0005481648.novalocal lvm[93474]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 12 14:40:13 np0005481648.novalocal lvm[93474]: VG cinder-volumes finished Oct 12 14:40:13 np0005481648.novalocal sudo[93470]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:13 np0005481648.novalocal systemd[1]: session-c101.scope: Deactivated successfully. Oct 12 14:40:16 np0005481648.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 12 14:40:17 np0005481648.novalocal sudo[93502]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-679f980e-859b-4f86-951a-5a764e8b682c Oct 12 14:40:17 np0005481648.novalocal systemd[1]: Started Session c102 of User root. Oct 12 14:40:17 np0005481648.novalocal sudo[93502]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:17 np0005481648.novalocal sudo[93502]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:17 np0005481648.novalocal systemd[1]: session-c102.scope: Deactivated successfully. Oct 12 14:40:17 np0005481648.novalocal sudo[93506]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-679f980e-859b-4f86-951a-5a764e8b682c iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c PRcmPZ6RReR8KeFZb8qv pNz7as7k4FKQQuk6 False -p3260 -a::1 Oct 12 14:40:17 np0005481648.novalocal systemd[1]: Started Session c103 of User root. Oct 12 14:40:17 np0005481648.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 12 14:40:17 np0005481648.novalocal sudo[93506]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:18 np0005481648.novalocal sudo[93506]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:18 np0005481648.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service. Oct 12 14:40:18 np0005481648.novalocal systemd[1]: session-c103.scope: Deactivated successfully. Oct 12 14:40:18 np0005481648.novalocal sudo[93529]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 12 14:40:18 np0005481648.novalocal systemd[1]: Started Session c104 of User root. Oct 12 14:40:18 np0005481648.novalocal sudo[93529]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:18 np0005481648.novalocal sudo[93529]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:18 np0005481648.novalocal systemd[1]: session-c104.scope: Deactivated successfully. Oct 12 14:40:18 np0005481648.novalocal sudo[93537]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 12 14:40:18 np0005481648.novalocal systemd[1]: Started Session c105 of User root. Oct 12 14:40:18 np0005481648.novalocal sudo[93537]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:19 np0005481648.novalocal sudo[93537]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:19 np0005481648.novalocal systemd[1]: session-c105.scope: Deactivated successfully. Oct 12 14:40:19 np0005481648.novalocal sudo[93542]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c PRcmPZ6RReR8KeFZb8qv pNz7as7k4FKQQuk6 iqn.1994-05.com.redhat:6c58e158f1b6 Oct 12 14:40:19 np0005481648.novalocal systemd[1]: Started Session c106 of User root. Oct 12 14:40:19 np0005481648.novalocal sudo[93542]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:19 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l 0bb3e9e9-e7f7-4c0c-8256-c697bddefa74 Oct 12 14:40:19 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:40:19 np0005481648.novalocal sudo[93542]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:19 np0005481648.novalocal systemd[1]: session-c106.scope: Deactivated successfully. Oct 12 14:40:19 np0005481648.novalocal setroubleshoot[93499]: failed to retrieve rpm info for path '/run/blkid/blkid.tab': Oct 12 14:40:19 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l f6fd2a67-c78c-452f-87cd-86876f9fa1a9 Oct 12 14:40:19 np0005481648.novalocal sudo[93551]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 12 14:40:19 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:40:19 np0005481648.novalocal systemd[1]: Started Session c107 of User root. Oct 12 14:40:19 np0005481648.novalocal setroubleshoot[93499]: failed to retrieve rpm info for path '/dev/vda1': Oct 12 14:40:19 np0005481648.novalocal sudo[93551]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:19 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 6a565df5-be98-425c-b05e-f25e80bec98f Oct 12 14:40:19 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:40:19 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l 778dffbd-e3f4-403f-805e-342f54776bb9 Oct 12 14:40:19 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:40:19 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l fdc0f88a-9ea6-45e0-a92c-efa8a68b86e8 Oct 12 14:40:19 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:40:19 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 8d6a2410-f8ed-4faf-93d1-166ff91888da Oct 12 14:40:19 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:40:19 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l db8f37e1-40d4-4fed-bc02-c8735690bb0e Oct 12 14:40:19 np0005481648.novalocal sudo[93556]: nova : PWD=/ ; USER=root ; COMMAND=/usr/bin/nova-rootwrap /etc/nova/rootwrap.conf privsep-helper --config-file /etc/nova/nova.conf --config-file /etc/nova/nova-compute.conf --privsep_context os_brick.privileged.default --privsep_sock_path /tmp/tmplea55sfn/privsep.sock Oct 12 14:40:19 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:40:19 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l dfd9d4db-2500-4ffb-9820-8c7286d768f2 Oct 12 14:40:19 np0005481648.novalocal systemd[1]: Started Session c108 of User root. Oct 12 14:40:19 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:40:19 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 74a8dd0a-313c-4fdd-804e-bbfdb86e6c8e Oct 12 14:40:19 np0005481648.novalocal sudo[93556]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=162) Oct 12 14:40:19 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:40:19 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l 2cc92859-553f-4cce-a269-69a6ed1b4275 Oct 12 14:40:19 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:40:19 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from 'read, write, open' accesses on the file /run/blkid/blkid.tab-8KAXSu. For complete SELinux messages run: sealert -l a9731ef2-2042-4836-b49f-1b9e568407e0 Oct 12 14:40:19 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from 'read, write, open' accesses on the file /run/blkid/blkid.tab-8KAXSu. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read write open access on the blkid.tab-8KAXSu file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:40:19 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-8KAXSu. For complete SELinux messages run: sealert -l 6ae5525b-d440-4ecb-b35d-f9fbc0726c94 Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-8KAXSu. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-8KAXSu file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l d00f204f-253b-4f87-a8a7-82f35de3034e Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l 64b59ed8-967a-40bc-9668-6d95bfd1b446 Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l 0e1c460c-e31e-4054-a7c0-385634dd9bbd Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l 31a27fc3-067a-41da-8d39-d9b196a73018 Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). For complete SELinux messages run: sealert -l 80e62589-3df7-4f04-b16f-46132a931715 Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:40:20 np0005481648.novalocal sudo[93551]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:20 np0005481648.novalocal systemd[1]: session-c107.scope: Deactivated successfully. Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 0c5fb7da-a194-4a34-8670-dafa26280f77 Oct 12 14:40:20 np0005481648.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Oct 12 14:40:20 np0005481648.novalocal iscsid[71266]: iscsid: Connection3:0 to [target: iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c, portal: ::1,3260] through [iface: default] is operational now Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l c1b3c07c-d6e6-495a-a13e-56ccd588b2c1 Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 685a4654-8042-40e2-b4ba-1a6dd49b053a Oct 12 14:40:20 np0005481648.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Oct 12 14:40:20 np0005481648.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Oct 12 14:40:20 np0005481648.novalocal kernel: scsi 2:0:0:0: alua: device naa.60014058f9c6c5563644692b7bd2e912 port group 0 rel port 1 Oct 12 14:40:20 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Oct 12 14:40:20 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Oct 12 14:40:20 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Oct 12 14:40:20 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Oct 12 14:40:20 np0005481648.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 12 14:40:20 np0005481648.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Oct 12 14:40:20 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Oct 12 14:40:20 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Oct 12 14:40:20 np0005481648.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 12 14:40:20 np0005481648.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Oct 12 14:40:20 np0005481648.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Oct 12 14:40:20 np0005481648.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 12 14:40:20 np0005481648.novalocal kernel: GPT:229375 != 2097151 Oct 12 14:40:20 np0005481648.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Oct 12 14:40:20 np0005481648.novalocal kernel: GPT:229375 != 2097151 Oct 12 14:40:20 np0005481648.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Oct 12 14:40:20 np0005481648.novalocal kernel: sda: sda1 sda15 Oct 12 14:40:20 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Oct 12 14:40:20 np0005481648.novalocal sudo[93556]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 00522d6b-80dd-4c7a-9b3a-d02d3e5f5998 Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l a6197c96-1e13-44d3-bbd1-f5a281bcb432 Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 401857b9-7d0e-47e4-b46d-1ee05162778c Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 1744f955-5c09-469b-b71a-e3c93f809cbe Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l a780b3cf-b1d0-4961-8229-57f014458614 Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 4d868040-debf-426c-8efc-cb757d051ef1 Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l b5772bfe-3a85-4bdd-9a70-187acae13ea6 Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l d60c043f-d22b-4a1a-91a4-59696d41fe78 Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l e4631b0e-c2fe-4892-8aa4-cc8b6b7365e6 Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 4f66f416-f222-4bc6-9f74-4c489fb45ba1 Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l af67624b-4da4-4835-9be1-d90bf1fb96d5 Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l 646f91dd-0268-44ad-9c7d-8622e7121bdd Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l e0d827d2-501c-4c14-8e33-0842b27a20f3 Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c/::1,3260. For complete SELinux messages run: sealert -l 65a53e64-3060-433b-b339-28b2074d98c5 Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:40:20 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c/::1,3260. For complete SELinux messages run: sealert -l 07827e25-063e-4375-bc1a-06ed64181cd8 Oct 12 14:40:21 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:40:21 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 130dba21-b7ab-408e-8031-9c380f83effe Oct 12 14:40:21 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:40:21 np0005481648.novalocal sudo[93624]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-5f0eaba0-d764-4cbf-ac18-4a05a9b518e1 Oct 12 14:40:21 np0005481648.novalocal systemd[1]: Started Session c109 of User root. Oct 12 14:40:21 np0005481648.novalocal sudo[93624]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:21 np0005481648.novalocal setroubleshoot[93499]: failed to retrieve rpm info for path '/sys/class/scsi_host/host2/scan': Oct 12 14:40:21 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 83135e20-c9ea-41c3-9659-c06c5b32888e Oct 12 14:40:21 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 12 14:40:21 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 64b66845-3656-4fc4-9b92-ef21d08812db Oct 12 14:40:21 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 12 14:40:21 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 2a9cea8e-eba0-4b87-8923-dd58722e28eb Oct 12 14:40:21 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 12 14:40:21 np0005481648.novalocal sudo[93624]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:21 np0005481648.novalocal systemd[1]: session-c109.scope: Deactivated successfully. Oct 12 14:40:21 np0005481648.novalocal sudo[93629]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-5f0eaba0-d764-4cbf-ac18-4a05a9b518e1 iqn.2010-10.org.openstack:volume-5f0eaba0-d764-4cbf-ac18-4a05a9b518e1 9Rjd8o36Ly4ssNAsnzoj VdBjyRFKRC4db2AB False -p3260 -a::1 Oct 12 14:40:21 np0005481648.novalocal systemd[1]: Started Session c110 of User root. Oct 12 14:40:21 np0005481648.novalocal sudo[93629]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:21 np0005481648.novalocal sudo[93632]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Oct 12 14:40:21 np0005481648.novalocal systemd[1]: Started Session c111 of User root. Oct 12 14:40:21 np0005481648.novalocal sudo[93632]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Oct 12 14:40:21 np0005481648.novalocal setroubleshoot[93499]: failed to retrieve rpm info for path '/dev/sda': Oct 12 14:40:21 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 6a565df5-be98-425c-b05e-f25e80bec98f Oct 12 14:40:21 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:40:21 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 75ba2f2b-b1f0-4e63-be63-acadc8e42a28 Oct 12 14:40:21 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 12 14:40:21 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 875f4aa1-fffb-41f2-adf0-dbbe9853c9a2 Oct 12 14:40:21 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 12 14:40:22 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 84438904-ac82-4875-be3d-66a902591683 Oct 12 14:40:22 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 12 14:40:22 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 539d174a-00ae-462a-8b0b-7fef69181df2 Oct 12 14:40:22 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 12 14:40:22 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l b7186406-04a9-4168-8da7-f87556f6291a Oct 12 14:40:22 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 12 14:40:22 np0005481648.novalocal sudo[93629]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:22 np0005481648.novalocal systemd[1]: session-c110.scope: Deactivated successfully. Oct 12 14:40:22 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 6b1045ed-6f90-4e81-a551-0d9b664b0c21 Oct 12 14:40:22 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 12 14:40:22 np0005481648.novalocal sudo[93645]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 12 14:40:22 np0005481648.novalocal systemd[1]: Started Session c112 of User root. Oct 12 14:40:22 np0005481648.novalocal sudo[93645]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:22 np0005481648.novalocal sudo[93632]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:22 np0005481648.novalocal systemd[1]: session-c111.scope: Deactivated successfully. Oct 12 14:40:22 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 6a565df5-be98-425c-b05e-f25e80bec98f Oct 12 14:40:22 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:40:22 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l 3a15a085-f59a-4c6a-bd97-12889c5d4c6d Oct 12 14:40:22 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Oct 12 14:40:22 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l 778dffbd-e3f4-403f-805e-342f54776bb9 Oct 12 14:40:22 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:40:22 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l fdc0f88a-9ea6-45e0-a92c-efa8a68b86e8 Oct 12 14:40:22 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:40:22 np0005481648.novalocal sudo[93645]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:22 np0005481648.novalocal systemd[1]: session-c112.scope: Deactivated successfully. Oct 12 14:40:22 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 8d6a2410-f8ed-4faf-93d1-166ff91888da Oct 12 14:40:22 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:40:22 np0005481648.novalocal sudo[93654]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 12 14:40:22 np0005481648.novalocal systemd[1]: Started Session c113 of User root. Oct 12 14:40:22 np0005481648.novalocal sudo[93654]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:22 np0005481648.novalocal sudo[93656]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Oct 12 14:40:22 np0005481648.novalocal systemd[1]: Started Session c114 of User root. Oct 12 14:40:22 np0005481648.novalocal sudo[93656]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Oct 12 14:40:23 np0005481648.novalocal sudo[93656]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:23 np0005481648.novalocal systemd[1]: session-c114.scope: Deactivated successfully. Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 00522d6b-80dd-4c7a-9b3a-d02d3e5f5998 Oct 12 14:40:23 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Oct 12 14:40:23 np0005481648.novalocal kernel: scsi 2:0:0:0: alua: Detached Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. For complete SELinux messages run: sealert -l b5772bfe-3a85-4bdd-9a70-187acae13ea6 Oct 12 14:40:23 np0005481648.novalocal iscsid[71266]: iscsid: Connection3:0 to [target: iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c, portal: ::1,3260] through [iface: default] is shutdown. Oct 12 14:40:23 np0005481648.novalocal sudo[93654]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:23 np0005481648.novalocal systemd[1]: session-c113.scope: Deactivated successfully. Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the send_targets directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:40:23 np0005481648.novalocal sudo[93700]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-5f0eaba0-d764-4cbf-ac18-4a05a9b518e1 9Rjd8o36Ly4ssNAsnzoj VdBjyRFKRC4db2AB iqn.1994-05.com.redhat:6c58e158f1b6 Oct 12 14:40:23 np0005481648.novalocal systemd[1]: Started Session c115 of User root. Oct 12 14:40:23 np0005481648.novalocal sudo[93700]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c/::1,3260. For complete SELinux messages run: sealert -l 07827e25-063e-4375-bc1a-06ed64181cd8 Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l a6197c96-1e13-44d3-bbd1-f5a281bcb432 Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 401857b9-7d0e-47e4-b46d-1ee05162778c Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 1744f955-5c09-469b-b71a-e3c93f809cbe Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l a780b3cf-b1d0-4961-8229-57f014458614 Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 4d868040-debf-426c-8efc-cb757d051ef1 Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 130dba21-b7ab-408e-8031-9c380f83effe Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c/::1,3260. For complete SELinux messages run: sealert -l 97d0fb62-210e-4682-b4c9-37242f4904d0 Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l d60c043f-d22b-4a1a-91a4-59696d41fe78 Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l e4631b0e-c2fe-4892-8aa4-cc8b6b7365e6 Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 0c5fb7da-a194-4a34-8670-dafa26280f77 Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l c1b3c07c-d6e6-495a-a13e-56ccd588b2c1 Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 685a4654-8042-40e2-b4ba-1a6dd49b053a Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/bin/tee from append access on the file delete. For complete SELinux messages run: sealert -l 2a9cea8e-eba0-4b87-8923-dd58722e28eb Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/bin/tee from append access on the file delete. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the delete file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l 31a307f5-ccb8-49ce-8048-12ce57210b56 Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c. For complete SELinux messages run: sealert -l 4f66f416-f222-4bc6-9f74-4c489fb45ba1 Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l cb9ec29e-1279-4555-8329-572e5cab3852 Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 8c0c66d4-b763-40d1-bcec-2b8ec0f338a5 Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c. For complete SELinux messages run: sealert -l 12085319-fb02-4e36-a535-32e76142c068 Oct 12 14:40:23 np0005481648.novalocal setroubleshoot[93499]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:40:23 np0005481648.novalocal sudo[93700]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:23 np0005481648.novalocal systemd[1]: session-c115.scope: Deactivated successfully. Oct 12 14:40:23 np0005481648.novalocal sudo[93711]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 12 14:40:23 np0005481648.novalocal systemd[1]: Started Session c116 of User root. Oct 12 14:40:23 np0005481648.novalocal sudo[93711]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:24 np0005481648.novalocal sudo[93711]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:24 np0005481648.novalocal systemd[1]: session-c116.scope: Deactivated successfully. Oct 12 14:40:24 np0005481648.novalocal sudo[93717]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c iqn.1994-05.com.redhat:6c58e158f1b6 Oct 12 14:40:24 np0005481648.novalocal systemd[1]: Started Session c117 of User root. Oct 12 14:40:24 np0005481648.novalocal sudo[93717]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:24 np0005481648.novalocal sudo[93717]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:24 np0005481648.novalocal systemd[1]: session-c117.scope: Deactivated successfully. Oct 12 14:40:25 np0005481648.novalocal sudo[93727]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 12 14:40:25 np0005481648.novalocal systemd[1]: Started Session c118 of User root. Oct 12 14:40:25 np0005481648.novalocal sudo[93727]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:25 np0005481648.novalocal sudo[93727]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:25 np0005481648.novalocal systemd[1]: session-c118.scope: Deactivated successfully. Oct 12 14:40:25 np0005481648.novalocal sudo[93732]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 12 14:40:25 np0005481648.novalocal systemd[1]: Started Session c119 of User root. Oct 12 14:40:25 np0005481648.novalocal sudo[93732]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:26 np0005481648.novalocal sudo[93732]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:26 np0005481648.novalocal systemd[1]: session-c119.scope: Deactivated successfully. Oct 12 14:40:26 np0005481648.novalocal sudo[93737]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-679f980e-859b-4f86-951a-5a764e8b682c Oct 12 14:40:26 np0005481648.novalocal systemd[1]: Started Session c120 of User root. Oct 12 14:40:26 np0005481648.novalocal sudo[93737]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:26 np0005481648.novalocal sudo[93737]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:26 np0005481648.novalocal systemd[1]: session-c120.scope: Deactivated successfully. Oct 12 14:40:26 np0005481648.novalocal sudo[93756]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 12 14:40:26 np0005481648.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Oct 12 14:40:26 np0005481648.novalocal iscsid[71266]: iscsid: Connection4:0 to [target: iqn.2010-10.org.openstack:volume-5f0eaba0-d764-4cbf-ac18-4a05a9b518e1, portal: ::1,3260] through [iface: default] is operational now Oct 12 14:40:26 np0005481648.novalocal systemd[1]: Started Session c121 of User root. Oct 12 14:40:26 np0005481648.novalocal sudo[93756]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:26 np0005481648.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Oct 12 14:40:26 np0005481648.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Oct 12 14:40:26 np0005481648.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405bb1ba5c27a334b568eac3464f port group 0 rel port 2 Oct 12 14:40:26 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Oct 12 14:40:26 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Oct 12 14:40:26 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Oct 12 14:40:26 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Oct 12 14:40:26 np0005481648.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 12 14:40:26 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Oct 12 14:40:26 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Oct 12 14:40:26 np0005481648.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Oct 12 14:40:26 np0005481648.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 12 14:40:26 np0005481648.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Oct 12 14:40:26 np0005481648.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Oct 12 14:40:26 np0005481648.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 12 14:40:26 np0005481648.novalocal kernel: GPT:229375 != 2097151 Oct 12 14:40:26 np0005481648.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Oct 12 14:40:26 np0005481648.novalocal kernel: GPT:229375 != 2097151 Oct 12 14:40:26 np0005481648.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Oct 12 14:40:26 np0005481648.novalocal kernel: sda: sda1 sda15 Oct 12 14:40:26 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Oct 12 14:40:27 np0005481648.novalocal sudo[93756]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:27 np0005481648.novalocal systemd[1]: session-c121.scope: Deactivated successfully. Oct 12 14:40:27 np0005481648.novalocal sudo[93791]: nova : PWD=/ ; USER=root ; COMMAND=/usr/bin/nova-rootwrap /etc/nova/rootwrap.conf privsep-helper --config-file /etc/nova/nova.conf --config-file /etc/nova/nova-compute.conf --privsep_context nova.privsep.sys_admin_pctxt --privsep_sock_path /tmp/tmp5vxnjyqi/privsep.sock Oct 12 14:40:27 np0005481648.novalocal systemd[1]: Started Session c122 of User root. Oct 12 14:40:27 np0005481648.novalocal sudo[93791]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=162) Oct 12 14:40:27 np0005481648.novalocal systemd[1]: Listening on libvirt secret daemon admin socket. Oct 12 14:40:27 np0005481648.novalocal systemd[1]: Listening on libvirt secret daemon read-only socket. Oct 12 14:40:27 np0005481648.novalocal systemd[1]: Starting libvirt secret daemon... Oct 12 14:40:27 np0005481648.novalocal systemd[1]: Started libvirt secret daemon. Oct 12 14:40:28 np0005481648.novalocal sudo[93791]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:29 np0005481648.novalocal sudo[93830]: nova : PWD=/ ; USER=root ; COMMAND=/usr/bin/nova-rootwrap /etc/nova/rootwrap.conf privsep-helper --config-file /etc/nova/nova.conf --config-file /etc/nova/nova-compute.conf --privsep_context vif_plug_ovs.privsep.vif_plug --privsep_sock_path /tmp/tmpihvim21t/privsep.sock Oct 12 14:40:29 np0005481648.novalocal systemd[1]: Started Session c123 of User root. Oct 12 14:40:29 np0005481648.novalocal sudo[93830]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=162) Oct 12 14:40:29 np0005481648.novalocal sudo[93830]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:31 np0005481648.novalocal kernel: tun: Universal TUN/TAP device driver, 1.6 Oct 12 14:40:31 np0005481648.novalocal NetworkManager[857]: [1760294431.8264] manager: (tap7ee93b83-49): new Tun device (/org/freedesktop/NetworkManager/Devices/9) Oct 12 14:40:31 np0005481648.novalocal NetworkManager[857]: [1760294431.8287] manager: (tap2378cb66-ab): new Tun device (/org/freedesktop/NetworkManager/Devices/10) Oct 12 14:40:31 np0005481648.novalocal kernel: tap2378cb66-ab: entered promiscuous mode Oct 12 14:40:31 np0005481648.novalocal kernel: tap7ee93b83-49: entered promiscuous mode Oct 12 14:40:31 np0005481648.novalocal virtqemud[90651]: Domain id=1 name='instance-00000002' uuid=a9cf94ff-8665-4579-9860-422fbefbaa84 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Oct 12 14:40:31 np0005481648.novalocal virtqemud[90651]: Domain id=2 name='instance-00000001' uuid=0d00be9e-c181-4093-8d87-72fb3b6010e1 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Oct 12 14:40:31 np0005481648.novalocal virtqemud[90651]: Domain id=2 name='instance-00000001' uuid=0d00be9e-c181-4093-8d87-72fb3b6010e1 is tainted: deprecated-config (CPU model 'qemu64') Oct 12 14:40:31 np0005481648.novalocal virtqemud[90651]: Domain id=1 name='instance-00000002' uuid=a9cf94ff-8665-4579-9860-422fbefbaa84 is tainted: deprecated-config (CPU model 'qemu64') Oct 12 14:40:31 np0005481648.novalocal systemd-machined[87546]: New machine qemu-2-instance-00000001. Oct 12 14:40:31 np0005481648.novalocal systemd-udevd[93875]: Network interface NamePolicy= disabled on kernel command line. Oct 12 14:40:31 np0005481648.novalocal systemd-udevd[93874]: Network interface NamePolicy= disabled on kernel command line. Oct 12 14:40:31 np0005481648.novalocal systemd[1]: Started Virtual Machine qemu-2-instance-00000001. Oct 12 14:40:31 np0005481648.novalocal systemd-machined[87546]: New machine qemu-1-instance-00000002. Oct 12 14:40:31 np0005481648.novalocal systemd[1]: Started Virtual Machine qemu-1-instance-00000002. Oct 12 14:40:31 np0005481648.novalocal NetworkManager[857]: [1760294431.9795] device (tap2378cb66-ab): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 12 14:40:31 np0005481648.novalocal NetworkManager[857]: [1760294431.9805] device (tap2378cb66-ab): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 12 14:40:31 np0005481648.novalocal NetworkManager[857]: [1760294431.9833] device (tap7ee93b83-49): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 12 14:40:31 np0005481648.novalocal NetworkManager[857]: [1760294431.9838] device (tap7ee93b83-49): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 12 14:40:32 np0005481648.novalocal sudo[93905]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /etc/neutron/plugins/ml2/ovn_agent.ini --config-dir /etc/neutron/conf.d/neutron-ovn-agent --privsep_context neutron.privileged.link_cmd --privsep_sock_path /tmp/tmpu8gvknat/privsep.sock Oct 12 14:40:32 np0005481648.novalocal systemd[1]: Started Session c124 of User root. Oct 12 14:40:32 np0005481648.novalocal sudo[93905]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 12 14:40:32 np0005481648.novalocal sudo[93905]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:33 np0005481648.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service: Deactivated successfully. Oct 12 14:40:33 np0005481648.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service: Consumed 1.333s CPU time. Oct 12 14:40:33 np0005481648.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 12 14:40:33 np0005481648.novalocal systemd[1]: setroubleshootd.service: Consumed 3.623s CPU time. Oct 12 14:40:34 np0005481648.novalocal NetworkManager[857]: [1760294434.0127] manager: (tap7f051275-10): new Veth device (/org/freedesktop/NetworkManager/Devices/11) Oct 12 14:40:34 np0005481648.novalocal NetworkManager[857]: [1760294434.0720] device (tap7f051275-10): carrier: link connected Oct 12 14:40:34 np0005481648.novalocal kernel: tap7f051275-10: entered promiscuous mode Oct 12 14:40:34 np0005481648.novalocal sudo[93951]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-7f051275-1f7e-4891-9312-7a0e26289385 env PROCESS_TAG=haproxy-7f051275-1f7e-4891-9312-7a0e26289385 haproxy -f /var/lib/neutron/ovn-metadata-proxy/7f051275-1f7e-4891-9312-7a0e26289385.conf Oct 12 14:40:34 np0005481648.novalocal systemd[1]: Started Session c125 of User root. Oct 12 14:40:34 np0005481648.novalocal sudo[93951]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 12 14:40:34 np0005481648.novalocal sudo[93951]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:34 np0005481648.novalocal systemd-udevd[93873]: Network interface NamePolicy= disabled on kernel command line. Oct 12 14:40:34 np0005481648.novalocal NetworkManager[857]: [1760294434.8207] manager: (tap2ec26c08-60): new Veth device (/org/freedesktop/NetworkManager/Devices/12) Oct 12 14:40:34 np0005481648.novalocal NetworkManager[857]: [1760294434.8934] device (tap2ec26c08-60): carrier: link connected Oct 12 14:40:35 np0005481648.novalocal kernel: tap2ec26c08-60: entered promiscuous mode Oct 12 14:40:35 np0005481648.novalocal sudo[94002]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-2ec26c08-6a9c-43da-8520-3c55c9e8612a env PROCESS_TAG=haproxy-2ec26c08-6a9c-43da-8520-3c55c9e8612a haproxy -f /var/lib/neutron/ovn-metadata-proxy/2ec26c08-6a9c-43da-8520-3c55c9e8612a.conf Oct 12 14:40:35 np0005481648.novalocal systemd[1]: Started Session c126 of User root. Oct 12 14:40:35 np0005481648.novalocal sudo[94002]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 12 14:40:35 np0005481648.novalocal sudo[94005]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:40:35 np0005481648.novalocal systemd[1]: Started Session c127 of User root. Oct 12 14:40:35 np0005481648.novalocal sudo[94005]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:35 np0005481648.novalocal sudo[94002]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:35 np0005481648.novalocal sudo[94005]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:35 np0005481648.novalocal systemd[1]: session-c127.scope: Deactivated successfully. Oct 12 14:40:35 np0005481648.novalocal sudo[94020]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:40:35 np0005481648.novalocal systemd[1]: Started Session c128 of User root. Oct 12 14:40:35 np0005481648.novalocal sudo[94020]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:36 np0005481648.novalocal sudo[94020]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:36 np0005481648.novalocal systemd[1]: session-c128.scope: Deactivated successfully. Oct 12 14:40:36 np0005481648.novalocal sudo[94031]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:40:36 np0005481648.novalocal systemd[1]: Started Session c129 of User root. Oct 12 14:40:36 np0005481648.novalocal sudo[94031]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:36 np0005481648.novalocal sudo[94031]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:36 np0005481648.novalocal systemd[1]: session-c129.scope: Deactivated successfully. Oct 12 14:40:36 np0005481648.novalocal sudo[94036]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:40:36 np0005481648.novalocal systemd[1]: Started Session c130 of User root. Oct 12 14:40:36 np0005481648.novalocal sudo[94036]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:36 np0005481648.novalocal sudo[94036]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:36 np0005481648.novalocal systemd[1]: session-c130.scope: Deactivated successfully. Oct 12 14:40:37 np0005481648.novalocal kernel: tap7ee93b83-49 (unregistering): left promiscuous mode Oct 12 14:40:37 np0005481648.novalocal NetworkManager[857]: [1760294437.3615] device (tap7ee93b83-49): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Oct 12 14:40:37 np0005481648.novalocal systemd[1]: session-c126.scope: Deactivated successfully. Oct 12 14:40:37 np0005481648.novalocal systemd[1]: machine-qemu\x2d1\x2dinstance\x2d00000002.scope: Deactivated successfully. Oct 12 14:40:37 np0005481648.novalocal systemd[1]: machine-qemu\x2d1\x2dinstance\x2d00000002.scope: Consumed 5.121s CPU time. Oct 12 14:40:37 np0005481648.novalocal kernel: tap2ec26c08-60: left promiscuous mode Oct 12 14:40:37 np0005481648.novalocal systemd-machined[87546]: Machine qemu-1-instance-00000002 terminated. Oct 12 14:40:37 np0005481648.novalocal systemd[1]: run-netns-ovnmeta\x2d2ec26c08\x2d6a9c\x2d43da\x2d8520\x2d3c55c9e8612a.mount: Deactivated successfully. Oct 12 14:40:37 np0005481648.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 12 14:40:37 np0005481648.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 12 14:40:37 np0005481648.novalocal kernel: GPT:229375 != 2097151 Oct 12 14:40:37 np0005481648.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Oct 12 14:40:37 np0005481648.novalocal kernel: GPT:229375 != 2097151 Oct 12 14:40:37 np0005481648.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Oct 12 14:40:37 np0005481648.novalocal kernel: sda: sda1 sda15 Oct 12 14:40:37 np0005481648.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 12 14:40:37 np0005481648.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 12 14:40:37 np0005481648.novalocal kernel: GPT:229375 != 2097151 Oct 12 14:40:37 np0005481648.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Oct 12 14:40:37 np0005481648.novalocal kernel: GPT:229375 != 2097151 Oct 12 14:40:37 np0005481648.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Oct 12 14:40:37 np0005481648.novalocal kernel: sda: sda1 sda15 Oct 12 14:40:37 np0005481648.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 12 14:40:37 np0005481648.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 12 14:40:37 np0005481648.novalocal kernel: GPT:229375 != 2097151 Oct 12 14:40:37 np0005481648.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Oct 12 14:40:37 np0005481648.novalocal kernel: GPT:229375 != 2097151 Oct 12 14:40:37 np0005481648.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Oct 12 14:40:37 np0005481648.novalocal kernel: sda: sda1 sda15 Oct 12 14:40:38 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Oct 12 14:40:38 np0005481648.novalocal kernel: scsi 2:0:0:0: alua: Detached Oct 12 14:40:38 np0005481648.novalocal iscsid[71266]: iscsid: Connection4:0 to [target: iqn.2010-10.org.openstack:volume-5f0eaba0-d764-4cbf-ac18-4a05a9b518e1, portal: ::1,3260] through [iface: default] is shutdown. Oct 12 14:40:40 np0005481648.novalocal sudo[94134]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-5f0eaba0-d764-4cbf-ac18-4a05a9b518e1 iqn.1994-05.com.redhat:6c58e158f1b6 Oct 12 14:40:40 np0005481648.novalocal systemd[1]: Started Session c131 of User root. Oct 12 14:40:40 np0005481648.novalocal sudo[94134]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:41 np0005481648.novalocal sudo[94134]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:41 np0005481648.novalocal systemd[1]: session-c131.scope: Deactivated successfully. Oct 12 14:40:41 np0005481648.novalocal sudo[94140]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 12 14:40:41 np0005481648.novalocal systemd[1]: Started Session c132 of User root. Oct 12 14:40:41 np0005481648.novalocal sudo[94140]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:41 np0005481648.novalocal sudo[94140]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:41 np0005481648.novalocal systemd[1]: session-c132.scope: Deactivated successfully. Oct 12 14:40:41 np0005481648.novalocal sudo[94146]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 12 14:40:41 np0005481648.novalocal systemd[1]: Started Session c133 of User root. Oct 12 14:40:41 np0005481648.novalocal sudo[94146]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:42 np0005481648.novalocal sudo[94146]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:42 np0005481648.novalocal systemd[1]: session-c133.scope: Deactivated successfully. Oct 12 14:40:42 np0005481648.novalocal sudo[94151]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-5f0eaba0-d764-4cbf-ac18-4a05a9b518e1 Oct 12 14:40:42 np0005481648.novalocal systemd[1]: Started Session c134 of User root. Oct 12 14:40:42 np0005481648.novalocal sudo[94151]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:43 np0005481648.novalocal sudo[94151]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:43 np0005481648.novalocal systemd[1]: session-c134.scope: Deactivated successfully. Oct 12 14:40:43 np0005481648.novalocal sudo[94156]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 12 14:40:43 np0005481648.novalocal systemd[1]: Started Session c135 of User root. Oct 12 14:40:43 np0005481648.novalocal sudo[94156]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:43 np0005481648.novalocal sudo[94156]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:43 np0005481648.novalocal systemd[1]: session-c135.scope: Deactivated successfully. Oct 12 14:40:44 np0005481648.novalocal sudo[94161]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 12 14:40:44 np0005481648.novalocal systemd[1]: Started Session c136 of User root. Oct 12 14:40:44 np0005481648.novalocal sudo[94161]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:44 np0005481648.novalocal sudo[94161]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:44 np0005481648.novalocal systemd[1]: session-c136.scope: Deactivated successfully. Oct 12 14:40:44 np0005481648.novalocal sudo[94167]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-5f0eaba0-d764-4cbf-ac18-4a05a9b518e1 Oct 12 14:40:44 np0005481648.novalocal systemd[1]: Started Session c137 of User root. Oct 12 14:40:44 np0005481648.novalocal sudo[94167]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:45 np0005481648.novalocal sudo[94167]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:45 np0005481648.novalocal systemd[1]: session-c137.scope: Deactivated successfully. Oct 12 14:40:45 np0005481648.novalocal sudo[94174]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-5f0eaba0-d764-4cbf-ac18-4a05a9b518e1 Oct 12 14:40:45 np0005481648.novalocal systemd[1]: Started Session c138 of User root. Oct 12 14:40:45 np0005481648.novalocal sudo[94174]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:45 np0005481648.novalocal sudo[94174]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:45 np0005481648.novalocal systemd[1]: session-c138.scope: Deactivated successfully. Oct 12 14:40:45 np0005481648.novalocal sudo[94192]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-5f0eaba0-d764-4cbf-ac18-4a05a9b518e1 Oct 12 14:40:45 np0005481648.novalocal systemd[1]: Started Session c139 of User root. Oct 12 14:40:45 np0005481648.novalocal sudo[94192]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:45 np0005481648.novalocal lvm[94199]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 12 14:40:45 np0005481648.novalocal lvm[94199]: VG cinder-volumes finished Oct 12 14:40:46 np0005481648.novalocal sudo[94192]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:46 np0005481648.novalocal systemd[1]: session-c139.scope: Deactivated successfully. Oct 12 14:40:46 np0005481648.novalocal sudo[94206]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:40:46 np0005481648.novalocal systemd[1]: Started Session c140 of User root. Oct 12 14:40:46 np0005481648.novalocal sudo[94206]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:46 np0005481648.novalocal sudo[94206]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:46 np0005481648.novalocal systemd[1]: session-c140.scope: Deactivated successfully. Oct 12 14:40:46 np0005481648.novalocal sudo[94210]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:40:46 np0005481648.novalocal systemd[1]: Started Session c141 of User root. Oct 12 14:40:46 np0005481648.novalocal sudo[94210]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:47 np0005481648.novalocal sudo[94210]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:47 np0005481648.novalocal systemd[1]: session-c141.scope: Deactivated successfully. Oct 12 14:40:47 np0005481648.novalocal sudo[94214]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:40:47 np0005481648.novalocal systemd[1]: Started Session c142 of User root. Oct 12 14:40:47 np0005481648.novalocal sudo[94214]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:47 np0005481648.novalocal sudo[94214]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:47 np0005481648.novalocal systemd[1]: session-c142.scope: Deactivated successfully. Oct 12 14:40:47 np0005481648.novalocal sudo[94218]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:40:47 np0005481648.novalocal systemd[1]: Started Session c143 of User root. Oct 12 14:40:47 np0005481648.novalocal sudo[94218]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:40:47 np0005481648.novalocal sudo[94218]: pam_unix(sudo:session): session closed for user root Oct 12 14:40:47 np0005481648.novalocal systemd[1]: session-c143.scope: Deactivated successfully. Oct 12 14:40:54 np0005481648.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 12 14:40:55 np0005481648.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 12 14:40:55 np0005481648.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@9.service. Oct 12 14:40:57 np0005481648.novalocal haproxy-metadata-proxy-7f051275-1f7e-4891-9312-7a0e26289385[93956]: 10.100.0.8:40748 [12/Oct/2025:14:40:54.154] listener listener/metadata 0/0/0/3203/3203 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Oct 12 14:40:57 np0005481648.novalocal setroubleshoot[94228]: SELinux is preventing /usr/sbin/httpd from read access on the file 3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2. For complete SELinux messages run: sealert -l e0e243bf-bf6e-4f1c-9508-d6f3d79c7cf8 Oct 12 14:40:57 np0005481648.novalocal setroubleshoot[94228]: SELinux is preventing /usr/sbin/httpd from read access on the file 3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed read access on the 3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 12 14:40:57 np0005481648.novalocal setroubleshoot[94228]: failed to retrieve rpm info for path '/var/lib/nova/.cache/python-entrypoints/3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2': Oct 12 14:40:57 np0005481648.novalocal setroubleshoot[94228]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2. For complete SELinux messages run: sealert -l fd96bb5c-1dea-4347-a1fd-bd1266bd6283 Oct 12 14:40:57 np0005481648.novalocal setroubleshoot[94228]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed open access on the 3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 12 14:40:57 np0005481648.novalocal setroubleshoot[94228]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2. For complete SELinux messages run: sealert -l 06bbf07a-a534-42bd-980d-a1f7b0edb89d Oct 12 14:40:57 np0005481648.novalocal setroubleshoot[94228]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the 3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 12 14:40:57 np0005481648.novalocal setroubleshoot[94228]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2. For complete SELinux messages run: sealert -l c5f81335-3c4c-4fe3-9391-310768669f2e Oct 12 14:40:57 np0005481648.novalocal setroubleshoot[94228]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the 3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 12 14:40:58 np0005481648.novalocal setroubleshoot[94228]: SELinux is preventing /usr/sbin/httpd from read access on the file 3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2. For complete SELinux messages run: sealert -l e0e243bf-bf6e-4f1c-9508-d6f3d79c7cf8 Oct 12 14:40:58 np0005481648.novalocal setroubleshoot[94228]: SELinux is preventing /usr/sbin/httpd from read access on the file 3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed read access on the 3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 12 14:40:58 np0005481648.novalocal setroubleshoot[94228]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2. For complete SELinux messages run: sealert -l fd96bb5c-1dea-4347-a1fd-bd1266bd6283 Oct 12 14:40:58 np0005481648.novalocal setroubleshoot[94228]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed open access on the 3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 12 14:40:58 np0005481648.novalocal setroubleshoot[94228]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2. For complete SELinux messages run: sealert -l 06bbf07a-a534-42bd-980d-a1f7b0edb89d Oct 12 14:40:58 np0005481648.novalocal setroubleshoot[94228]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the 3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 12 14:40:59 np0005481648.novalocal setroubleshoot[94228]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2. For complete SELinux messages run: sealert -l c5f81335-3c4c-4fe3-9391-310768669f2e Oct 12 14:40:59 np0005481648.novalocal setroubleshoot[94228]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the 3ac4da7b26b947f3ae07ca475d0cedec6a0166edc90e22a0cf176bc5bd452fc2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 12 14:40:59 np0005481648.novalocal haproxy-metadata-proxy-7f051275-1f7e-4891-9312-7a0e26289385[93956]: 10.100.0.8:40754 [12/Oct/2025:14:40:57.464] listener listener/metadata 0/0/0/1997/1997 200 114 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Oct 12 14:40:59 np0005481648.novalocal haproxy-metadata-proxy-7f051275-1f7e-4891-9312-7a0e26289385[93956]: 10.100.0.8:38274 [12/Oct/2025:14:40:59.501] listener listener/metadata 0/0/0/12/12 200 292 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Oct 12 14:40:59 np0005481648.novalocal haproxy-metadata-proxy-7f051275-1f7e-4891-9312-7a0e26289385[93956]: 10.100.0.8:38276 [12/Oct/2025:14:40:59.551] listener listener/metadata 0/0/0/13/13 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Oct 12 14:40:59 np0005481648.novalocal haproxy-metadata-proxy-7f051275-1f7e-4891-9312-7a0e26289385[93956]: 10.100.0.8:38286 [12/Oct/2025:14:40:59.609] listener listener/metadata 0/0/0/8/8 200 87 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Oct 12 14:40:59 np0005481648.novalocal haproxy-metadata-proxy-7f051275-1f7e-4891-9312-7a0e26289385[93956]: 10.100.0.8:38296 [12/Oct/2025:14:40:59.667] listener listener/metadata 0/0/0/9/9 200 93 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Oct 12 14:40:59 np0005481648.novalocal haproxy-metadata-proxy-7f051275-1f7e-4891-9312-7a0e26289385[93956]: 10.100.0.8:38306 [12/Oct/2025:14:40:59.744] listener listener/metadata 0/0/0/9/9 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Oct 12 14:40:59 np0005481648.novalocal haproxy-metadata-proxy-7f051275-1f7e-4891-9312-7a0e26289385[93956]: 10.100.0.8:38318 [12/Oct/2025:14:40:59.808] listener listener/metadata 0/0/0/10/10 200 98 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Oct 12 14:40:59 np0005481648.novalocal haproxy-metadata-proxy-7f051275-1f7e-4891-9312-7a0e26289385[93956]: 10.100.0.8:38326 [12/Oct/2025:14:40:59.861] listener listener/metadata 0/0/0/9/9 200 151 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Oct 12 14:40:59 np0005481648.novalocal haproxy-metadata-proxy-7f051275-1f7e-4891-9312-7a0e26289385[93956]: 10.100.0.8:38328 [12/Oct/2025:14:40:59.908] listener listener/metadata 0/0/0/15/15 200 151 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Oct 12 14:40:59 np0005481648.novalocal haproxy-metadata-proxy-7f051275-1f7e-4891-9312-7a0e26289385[93956]: 10.100.0.8:38336 [12/Oct/2025:14:40:59.957] listener listener/metadata 0/0/0/15/15 200 182 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Oct 12 14:41:00 np0005481648.novalocal haproxy-metadata-proxy-7f051275-1f7e-4891-9312-7a0e26289385[93956]: 10.100.0.8:38338 [12/Oct/2025:14:41:00.006] listener listener/metadata 0/0/0/12/12 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Oct 12 14:41:00 np0005481648.novalocal haproxy-metadata-proxy-7f051275-1f7e-4891-9312-7a0e26289385[93956]: 10.100.0.8:38346 [12/Oct/2025:14:41:00.043] listener listener/metadata 0/0/0/16/16 200 89 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Oct 12 14:41:00 np0005481648.novalocal haproxy-metadata-proxy-7f051275-1f7e-4891-9312-7a0e26289385[93956]: 10.100.0.8:38354 [12/Oct/2025:14:41:00.086] listener listener/metadata 0/0/0/13/13 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Oct 12 14:41:00 np0005481648.novalocal haproxy-metadata-proxy-7f051275-1f7e-4891-9312-7a0e26289385[93956]: 10.100.0.8:38360 [12/Oct/2025:14:41:00.134] listener listener/metadata 0/0/0/14/14 200 151 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Oct 12 14:41:00 np0005481648.novalocal haproxy-metadata-proxy-7f051275-1f7e-4891-9312-7a0e26289385[93956]: 10.100.0.8:38362 [12/Oct/2025:14:41:00.183] listener listener/metadata 0/0/0/11/11 200 90 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Oct 12 14:41:06 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:41:06 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:41:06 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:41:09 np0005481648.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@9.service: Deactivated successfully. Oct 12 14:41:09 np0005481648.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@9.service: Consumed 1.346s CPU time. Oct 12 14:41:09 np0005481648.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 12 14:41:09 np0005481648.novalocal systemd[1]: setroubleshootd.service: Consumed 1.633s CPU time. Oct 12 14:41:19 np0005481648.novalocal kernel: tapab674b6a-a9: entered promiscuous mode Oct 12 14:41:19 np0005481648.novalocal NetworkManager[857]: [1760294479.3876] manager: (tapab674b6a-a9): new Tun device (/org/freedesktop/NetworkManager/Devices/13) Oct 12 14:41:19 np0005481648.novalocal virtqemud[90651]: Domain id=3 name='instance-00000003' uuid=97c7dfdf-fa8a-4e21-b43f-427d93747d6e is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Oct 12 14:41:19 np0005481648.novalocal virtqemud[90651]: Domain id=3 name='instance-00000003' uuid=97c7dfdf-fa8a-4e21-b43f-427d93747d6e is tainted: deprecated-config (CPU model 'qemu64') Oct 12 14:41:19 np0005481648.novalocal systemd-udevd[94357]: Network interface NamePolicy= disabled on kernel command line. Oct 12 14:41:19 np0005481648.novalocal NetworkManager[857]: [1760294479.4428] device (tapab674b6a-a9): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 12 14:41:19 np0005481648.novalocal NetworkManager[857]: [1760294479.4435] device (tapab674b6a-a9): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 12 14:41:19 np0005481648.novalocal systemd-machined[87546]: New machine qemu-3-instance-00000003. Oct 12 14:41:19 np0005481648.novalocal systemd[1]: Started Virtual Machine qemu-3-instance-00000003. Oct 12 14:41:19 np0005481648.novalocal systemd-udevd[94359]: Network interface NamePolicy= disabled on kernel command line. Oct 12 14:41:19 np0005481648.novalocal NetworkManager[857]: [1760294479.5967] manager: (tapbe8dc668-10): new Veth device (/org/freedesktop/NetworkManager/Devices/14) Oct 12 14:41:19 np0005481648.novalocal NetworkManager[857]: [1760294479.6582] device (tapbe8dc668-10): carrier: link connected Oct 12 14:41:19 np0005481648.novalocal kernel: tapbe8dc668-10: entered promiscuous mode Oct 12 14:41:19 np0005481648.novalocal sudo[94408]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-be8dc668-1d3f-4f48-aab9-65d3fb59a054 env PROCESS_TAG=haproxy-be8dc668-1d3f-4f48-aab9-65d3fb59a054 haproxy -f /var/lib/neutron/ovn-metadata-proxy/be8dc668-1d3f-4f48-aab9-65d3fb59a054.conf Oct 12 14:41:19 np0005481648.novalocal systemd[1]: Started Session c144 of User root. Oct 12 14:41:19 np0005481648.novalocal sudo[94408]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 12 14:41:20 np0005481648.novalocal sudo[94408]: pam_unix(sudo:session): session closed for user root Oct 12 14:41:25 np0005481648.novalocal kernel: tap2378cb66-ab (unregistering): left promiscuous mode Oct 12 14:41:25 np0005481648.novalocal NetworkManager[857]: [1760294485.6805] device (tap2378cb66-ab): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Oct 12 14:41:25 np0005481648.novalocal systemd[1]: machine-qemu\x2d2\x2dinstance\x2d00000001.scope: Deactivated successfully. Oct 12 14:41:25 np0005481648.novalocal systemd[1]: machine-qemu\x2d2\x2dinstance\x2d00000001.scope: Consumed 22.117s CPU time. Oct 12 14:41:25 np0005481648.novalocal systemd[1]: session-c125.scope: Deactivated successfully. Oct 12 14:41:25 np0005481648.novalocal systemd-machined[87546]: Machine qemu-2-instance-00000001 terminated. Oct 12 14:41:25 np0005481648.novalocal kernel: tap7f051275-10: left promiscuous mode Oct 12 14:41:25 np0005481648.novalocal systemd[1]: run-netns-ovnmeta\x2d7f051275\x2d1f7e\x2d4891\x2d9312\x2d7a0e26289385.mount: Deactivated successfully. Oct 12 14:41:32 np0005481648.novalocal kernel: tapab674b6a-a9 (unregistering): left promiscuous mode Oct 12 14:41:32 np0005481648.novalocal NetworkManager[857]: [1760294492.3243] device (tapab674b6a-a9): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Oct 12 14:41:32 np0005481648.novalocal systemd[1]: session-c144.scope: Deactivated successfully. Oct 12 14:41:32 np0005481648.novalocal systemd[1]: machine-qemu\x2d3\x2dinstance\x2d00000003.scope: Deactivated successfully. Oct 12 14:41:32 np0005481648.novalocal systemd[1]: machine-qemu\x2d3\x2dinstance\x2d00000003.scope: Consumed 12.709s CPU time. Oct 12 14:41:32 np0005481648.novalocal kernel: tapbe8dc668-10: left promiscuous mode Oct 12 14:41:32 np0005481648.novalocal systemd-machined[87546]: Machine qemu-3-instance-00000003 terminated. Oct 12 14:41:32 np0005481648.novalocal NetworkManager[857]: [1760294492.4379] manager: (tapab674b6a-a9): new Tun device (/org/freedesktop/NetworkManager/Devices/15) Oct 12 14:41:32 np0005481648.novalocal systemd-udevd[94494]: Network interface NamePolicy= disabled on kernel command line. Oct 12 14:41:32 np0005481648.novalocal kernel: tapab674b6a-a9: entered promiscuous mode Oct 12 14:41:32 np0005481648.novalocal kernel: tapab674b6a-a9 (unregistering): left promiscuous mode Oct 12 14:41:32 np0005481648.novalocal systemd[1]: run-netns-ovnmeta\x2dbe8dc668\x2d1d3f\x2d4f48\x2daab9\x2d65d3fb59a054.mount: Deactivated successfully. Oct 12 14:41:32 np0005481648.novalocal NetworkManager[857]: [1760294492.5882] manager: (tapbe8dc668-10): new Veth device (/org/freedesktop/NetworkManager/Devices/16) Oct 12 14:41:32 np0005481648.novalocal NetworkManager[857]: [1760294492.6604] device (tapbe8dc668-10): carrier: link connected Oct 12 14:41:32 np0005481648.novalocal kernel: tapbe8dc668-10: entered promiscuous mode Oct 12 14:41:32 np0005481648.novalocal sudo[94553]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-be8dc668-1d3f-4f48-aab9-65d3fb59a054 env PROCESS_TAG=haproxy-be8dc668-1d3f-4f48-aab9-65d3fb59a054 haproxy -f /var/lib/neutron/ovn-metadata-proxy/be8dc668-1d3f-4f48-aab9-65d3fb59a054.conf Oct 12 14:41:32 np0005481648.novalocal systemd[1]: Started Session c145 of User root. Oct 12 14:41:32 np0005481648.novalocal sudo[94553]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 12 14:41:33 np0005481648.novalocal sudo[94553]: pam_unix(sudo:session): session closed for user root Oct 12 14:41:33 np0005481648.novalocal systemd[1]: session-c145.scope: Deactivated successfully. Oct 12 14:41:33 np0005481648.novalocal kernel: tapbe8dc668-10: left promiscuous mode Oct 12 14:41:33 np0005481648.novalocal systemd[1]: run-netns-ovnmeta\x2dbe8dc668\x2d1d3f\x2d4f48\x2daab9\x2d65d3fb59a054.mount: Deactivated successfully. Oct 12 14:41:35 np0005481648.novalocal sudo[94574]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:41:35 np0005481648.novalocal systemd[1]: Started Session c146 of User root. Oct 12 14:41:35 np0005481648.novalocal sudo[94574]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:41:35 np0005481648.novalocal sudo[94574]: pam_unix(sudo:session): session closed for user root Oct 12 14:41:35 np0005481648.novalocal systemd[1]: session-c146.scope: Deactivated successfully. Oct 12 14:41:35 np0005481648.novalocal sudo[94578]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:41:35 np0005481648.novalocal systemd[1]: Started Session c147 of User root. Oct 12 14:41:35 np0005481648.novalocal sudo[94578]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:41:36 np0005481648.novalocal sudo[94578]: pam_unix(sudo:session): session closed for user root Oct 12 14:41:36 np0005481648.novalocal systemd[1]: session-c147.scope: Deactivated successfully. Oct 12 14:41:36 np0005481648.novalocal sudo[94582]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:41:36 np0005481648.novalocal systemd[1]: Started Session c148 of User root. Oct 12 14:41:36 np0005481648.novalocal sudo[94582]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:41:36 np0005481648.novalocal sudo[94582]: pam_unix(sudo:session): session closed for user root Oct 12 14:41:36 np0005481648.novalocal systemd[1]: session-c148.scope: Deactivated successfully. Oct 12 14:41:36 np0005481648.novalocal sudo[94587]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:41:36 np0005481648.novalocal systemd[1]: Started Session c149 of User root. Oct 12 14:41:36 np0005481648.novalocal sudo[94587]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:41:37 np0005481648.novalocal sudo[94587]: pam_unix(sudo:session): session closed for user root Oct 12 14:41:37 np0005481648.novalocal systemd[1]: session-c149.scope: Deactivated successfully. Oct 12 14:41:56 np0005481648.novalocal kernel: tapa735292a-96: entered promiscuous mode Oct 12 14:41:56 np0005481648.novalocal NetworkManager[857]: [1760294516.9257] manager: (tapa735292a-96): new Tun device (/org/freedesktop/NetworkManager/Devices/17) Oct 12 14:41:56 np0005481648.novalocal virtqemud[90651]: Domain id=4 name='instance-00000004' uuid=4de31308-4043-4f4a-9c1e-39603a519930 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Oct 12 14:41:56 np0005481648.novalocal virtqemud[90651]: Domain id=4 name='instance-00000004' uuid=4de31308-4043-4f4a-9c1e-39603a519930 is tainted: deprecated-config (CPU model 'qemu64') Oct 12 14:41:56 np0005481648.novalocal systemd-machined[87546]: New machine qemu-4-instance-00000004. Oct 12 14:41:56 np0005481648.novalocal systemd[1]: Started Virtual Machine qemu-4-instance-00000004. Oct 12 14:41:57 np0005481648.novalocal systemd-udevd[94642]: Network interface NamePolicy= disabled on kernel command line. Oct 12 14:41:57 np0005481648.novalocal NetworkManager[857]: [1760294517.0290] device (tapa735292a-96): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 12 14:41:57 np0005481648.novalocal NetworkManager[857]: [1760294517.0295] device (tapa735292a-96): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 12 14:41:57 np0005481648.novalocal NetworkManager[857]: [1760294517.0515] manager: (tapb98f47f4-f0): new Veth device (/org/freedesktop/NetworkManager/Devices/18) Oct 12 14:41:57 np0005481648.novalocal systemd-udevd[94646]: Network interface NamePolicy= disabled on kernel command line. Oct 12 14:41:57 np0005481648.novalocal NetworkManager[857]: [1760294517.1219] device (tapb98f47f4-f0): carrier: link connected Oct 12 14:41:57 np0005481648.novalocal kernel: tapb98f47f4-f0: entered promiscuous mode Oct 12 14:41:57 np0005481648.novalocal sudo[94685]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-b98f47f4-ff6f-42de-bddc-78a3455f1e90 env PROCESS_TAG=haproxy-b98f47f4-ff6f-42de-bddc-78a3455f1e90 haproxy -f /var/lib/neutron/ovn-metadata-proxy/b98f47f4-ff6f-42de-bddc-78a3455f1e90.conf Oct 12 14:41:57 np0005481648.novalocal systemd[1]: Started Session c150 of User root. Oct 12 14:41:57 np0005481648.novalocal sudo[94685]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 12 14:41:57 np0005481648.novalocal sudo[94685]: pam_unix(sudo:session): session closed for user root Oct 12 14:42:06 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:42:06 np0005481648.novalocal kernel: tapc0f16911-51: entered promiscuous mode Oct 12 14:42:06 np0005481648.novalocal NetworkManager[857]: [1760294526.2640] manager: (tapc0f16911-51): new Tun device (/org/freedesktop/NetworkManager/Devices/19) Oct 12 14:42:06 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:42:06 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:42:06 np0005481648.novalocal virtqemud[90651]: Domain id=5 name='instance-00000005' uuid=b55ca460-e3e8-4981-9c72-ce71410d0f9d is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Oct 12 14:42:06 np0005481648.novalocal virtqemud[90651]: Domain id=5 name='instance-00000005' uuid=b55ca460-e3e8-4981-9c72-ce71410d0f9d is tainted: deprecated-config (CPU model 'qemu64') Oct 12 14:42:06 np0005481648.novalocal systemd-udevd[94741]: Network interface NamePolicy= disabled on kernel command line. Oct 12 14:42:06 np0005481648.novalocal systemd-machined[87546]: New machine qemu-5-instance-00000005. Oct 12 14:42:06 np0005481648.novalocal NetworkManager[857]: [1760294526.3633] device (tapc0f16911-51): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 12 14:42:06 np0005481648.novalocal NetworkManager[857]: [1760294526.3641] device (tapc0f16911-51): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 12 14:42:06 np0005481648.novalocal systemd[1]: Started Virtual Machine qemu-5-instance-00000005. Oct 12 14:42:06 np0005481648.novalocal systemd-udevd[94747]: Network interface NamePolicy= disabled on kernel command line. Oct 12 14:42:06 np0005481648.novalocal NetworkManager[857]: [1760294526.3806] manager: (tap9098ee8d-00): new Veth device (/org/freedesktop/NetworkManager/Devices/20) Oct 12 14:42:06 np0005481648.novalocal NetworkManager[857]: [1760294526.4459] device (tap9098ee8d-00): carrier: link connected Oct 12 14:42:06 np0005481648.novalocal kernel: tap9098ee8d-00: entered promiscuous mode Oct 12 14:42:06 np0005481648.novalocal sudo[94787]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-9098ee8d-0e32-4229-b277-a9f7f663514f env PROCESS_TAG=haproxy-9098ee8d-0e32-4229-b277-a9f7f663514f haproxy -f /var/lib/neutron/ovn-metadata-proxy/9098ee8d-0e32-4229-b277-a9f7f663514f.conf Oct 12 14:42:06 np0005481648.novalocal systemd[1]: Started Session c151 of User root. Oct 12 14:42:06 np0005481648.novalocal sudo[94787]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 12 14:42:06 np0005481648.novalocal sudo[94787]: pam_unix(sudo:session): session closed for user root Oct 12 14:42:09 np0005481648.novalocal kernel: tapa735292a-96 (unregistering): left promiscuous mode Oct 12 14:42:09 np0005481648.novalocal NetworkManager[857]: [1760294529.7915] device (tapa735292a-96): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Oct 12 14:42:09 np0005481648.novalocal systemd[1]: session-c150.scope: Deactivated successfully. Oct 12 14:42:09 np0005481648.novalocal kernel: tapb98f47f4-f0: left promiscuous mode Oct 12 14:42:09 np0005481648.novalocal systemd[1]: machine-qemu\x2d4\x2dinstance\x2d00000004.scope: Deactivated successfully. Oct 12 14:42:09 np0005481648.novalocal systemd[1]: machine-qemu\x2d4\x2dinstance\x2d00000004.scope: Consumed 10.299s CPU time. Oct 12 14:42:09 np0005481648.novalocal systemd-machined[87546]: Machine qemu-4-instance-00000004 terminated. Oct 12 14:42:09 np0005481648.novalocal systemd[1]: run-netns-ovnmeta\x2db98f47f4\x2dff6f\x2d42de\x2dbddc\x2d78a3455f1e90.mount: Deactivated successfully. Oct 12 14:42:18 np0005481648.novalocal kernel: tapc0f16911-51 (unregistering): left promiscuous mode Oct 12 14:42:18 np0005481648.novalocal NetworkManager[857]: [1760294538.1914] device (tapc0f16911-51): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Oct 12 14:42:18 np0005481648.novalocal systemd[1]: machine-qemu\x2d5\x2dinstance\x2d00000005.scope: Deactivated successfully. Oct 12 14:42:18 np0005481648.novalocal systemd[1]: machine-qemu\x2d5\x2dinstance\x2d00000005.scope: Consumed 11.767s CPU time. Oct 12 14:42:18 np0005481648.novalocal systemd-machined[87546]: Machine qemu-5-instance-00000005 terminated. Oct 12 14:42:18 np0005481648.novalocal kernel: tap9098ee8d-00: left promiscuous mode Oct 12 14:42:18 np0005481648.novalocal systemd[1]: run-netns-ovnmeta\x2d9098ee8d\x2d0e32\x2d4229\x2db277\x2da9f7f663514f.mount: Deactivated successfully. Oct 12 14:42:18 np0005481648.novalocal systemd[1]: session-c151.scope: Deactivated successfully. Oct 12 14:42:35 np0005481648.novalocal sudo[94951]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:42:35 np0005481648.novalocal systemd[1]: Started Session c152 of User root. Oct 12 14:42:35 np0005481648.novalocal sudo[94951]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:42:35 np0005481648.novalocal sudo[94951]: pam_unix(sudo:session): session closed for user root Oct 12 14:42:35 np0005481648.novalocal systemd[1]: session-c152.scope: Deactivated successfully. Oct 12 14:42:35 np0005481648.novalocal sudo[94955]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:42:35 np0005481648.novalocal systemd[1]: Started Session c153 of User root. Oct 12 14:42:35 np0005481648.novalocal sudo[94955]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:42:36 np0005481648.novalocal sudo[94955]: pam_unix(sudo:session): session closed for user root Oct 12 14:42:36 np0005481648.novalocal systemd[1]: session-c153.scope: Deactivated successfully. Oct 12 14:42:36 np0005481648.novalocal sudo[94960]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:42:36 np0005481648.novalocal systemd[1]: Started Session c154 of User root. Oct 12 14:42:36 np0005481648.novalocal sudo[94960]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:42:36 np0005481648.novalocal sudo[94960]: pam_unix(sudo:session): session closed for user root Oct 12 14:42:36 np0005481648.novalocal systemd[1]: session-c154.scope: Deactivated successfully. Oct 12 14:42:36 np0005481648.novalocal sudo[94978]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:42:36 np0005481648.novalocal systemd[1]: Started Session c155 of User root. Oct 12 14:42:36 np0005481648.novalocal sudo[94978]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:42:37 np0005481648.novalocal sudo[94978]: pam_unix(sudo:session): session closed for user root Oct 12 14:42:37 np0005481648.novalocal systemd[1]: session-c155.scope: Deactivated successfully. Oct 12 14:42:39 np0005481648.novalocal kernel: tapac3a3a22-0b: entered promiscuous mode Oct 12 14:42:39 np0005481648.novalocal NetworkManager[857]: [1760294559.8327] manager: (tapac3a3a22-0b): new Tun device (/org/freedesktop/NetworkManager/Devices/21) Oct 12 14:42:39 np0005481648.novalocal virtqemud[90651]: Domain id=6 name='instance-00000006' uuid=e47e4256-c4a1-40a1-9c19-319b2caa6641 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Oct 12 14:42:39 np0005481648.novalocal virtqemud[90651]: Domain id=6 name='instance-00000006' uuid=e47e4256-c4a1-40a1-9c19-319b2caa6641 is tainted: deprecated-config (CPU model 'qemu64') Oct 12 14:42:39 np0005481648.novalocal systemd-machined[87546]: New machine qemu-6-instance-00000006. Oct 12 14:42:39 np0005481648.novalocal systemd[1]: Started Virtual Machine qemu-6-instance-00000006. Oct 12 14:42:39 np0005481648.novalocal systemd-udevd[95008]: Network interface NamePolicy= disabled on kernel command line. Oct 12 14:42:39 np0005481648.novalocal NetworkManager[857]: [1760294559.9523] manager: (tap64b712bb-20): new Veth device (/org/freedesktop/NetworkManager/Devices/22) Oct 12 14:42:39 np0005481648.novalocal systemd-udevd[95010]: Network interface NamePolicy= disabled on kernel command line. Oct 12 14:42:39 np0005481648.novalocal NetworkManager[857]: [1760294559.9674] device (tapac3a3a22-0b): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 12 14:42:39 np0005481648.novalocal NetworkManager[857]: [1760294559.9679] device (tapac3a3a22-0b): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 12 14:42:40 np0005481648.novalocal NetworkManager[857]: [1760294560.0189] device (tap64b712bb-20): carrier: link connected Oct 12 14:42:40 np0005481648.novalocal kernel: tap64b712bb-20: entered promiscuous mode Oct 12 14:42:40 np0005481648.novalocal sudo[95050]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-64b712bb-2d17-4d9a-aa6f-a3bf6bf2a871 env PROCESS_TAG=haproxy-64b712bb-2d17-4d9a-aa6f-a3bf6bf2a871 haproxy -f /var/lib/neutron/ovn-metadata-proxy/64b712bb-2d17-4d9a-aa6f-a3bf6bf2a871.conf Oct 12 14:42:40 np0005481648.novalocal systemd[1]: Started Session c156 of User root. Oct 12 14:42:40 np0005481648.novalocal sudo[95050]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 12 14:42:40 np0005481648.novalocal sudo[95050]: pam_unix(sudo:session): session closed for user root Oct 12 14:42:54 np0005481648.novalocal kernel: tapac3a3a22-0b (unregistering): left promiscuous mode Oct 12 14:42:54 np0005481648.novalocal NetworkManager[857]: [1760294574.9779] device (tapac3a3a22-0b): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Oct 12 14:42:55 np0005481648.novalocal systemd[1]: machine-qemu\x2d6\x2dinstance\x2d00000006.scope: Deactivated successfully. Oct 12 14:42:55 np0005481648.novalocal systemd[1]: machine-qemu\x2d6\x2dinstance\x2d00000006.scope: Consumed 14.248s CPU time. Oct 12 14:42:55 np0005481648.novalocal systemd-machined[87546]: Machine qemu-6-instance-00000006 terminated. Oct 12 14:42:55 np0005481648.novalocal kernel: tap64b712bb-20: left promiscuous mode Oct 12 14:42:55 np0005481648.novalocal systemd[1]: session-c156.scope: Deactivated successfully. Oct 12 14:42:55 np0005481648.novalocal systemd[1]: run-netns-ovnmeta\x2d64b712bb\x2d2d17\x2d4d9a\x2daa6f\x2da3bf6bf2a871.mount: Deactivated successfully. Oct 12 14:43:06 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:43:06 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:43:06 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:43:11 np0005481648.novalocal sudo[95174]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-a20f3c85-73c8-4417-bb98-b39aeed233fc cinder-volumes/cinder-volumes-pool Oct 12 14:43:11 np0005481648.novalocal systemd[1]: Started Session c157 of User root. Oct 12 14:43:11 np0005481648.novalocal sudo[95174]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:43:12 np0005481648.novalocal lvm[95185]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 12 14:43:12 np0005481648.novalocal lvm[95185]: VG cinder-volumes finished Oct 12 14:43:12 np0005481648.novalocal sudo[95174]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:12 np0005481648.novalocal systemd[1]: session-c157.scope: Deactivated successfully. Oct 12 14:43:13 np0005481648.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 12 14:43:13 np0005481648.novalocal sudo[95195]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-a20f3c85-73c8-4417-bb98-b39aeed233fc Oct 12 14:43:13 np0005481648.novalocal systemd[1]: Started Session c158 of User root. Oct 12 14:43:13 np0005481648.novalocal sudo[95195]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:43:13 np0005481648.novalocal sudo[95195]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:13 np0005481648.novalocal systemd[1]: session-c158.scope: Deactivated successfully. Oct 12 14:43:13 np0005481648.novalocal sudo[95199]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-a20f3c85-73c8-4417-bb98-b39aeed233fc iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc 7JkR2NM8JEDFoAhi2wkU w329wJeyJDQyvAdt False -p3260 -a::1 Oct 12 14:43:13 np0005481648.novalocal systemd[1]: Started Session c159 of User root. Oct 12 14:43:13 np0005481648.novalocal sudo[95199]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:43:13 np0005481648.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 12 14:43:14 np0005481648.novalocal sudo[95199]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:14 np0005481648.novalocal systemd[1]: session-c159.scope: Deactivated successfully. Oct 12 14:43:14 np0005481648.novalocal sudo[95205]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 12 14:43:14 np0005481648.novalocal systemd[1]: Started Session c160 of User root. Oct 12 14:43:14 np0005481648.novalocal sudo[95205]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:43:14 np0005481648.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@10.service. Oct 12 14:43:14 np0005481648.novalocal sudo[95205]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:14 np0005481648.novalocal systemd[1]: session-c160.scope: Deactivated successfully. Oct 12 14:43:14 np0005481648.novalocal sudo[95224]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 12 14:43:14 np0005481648.novalocal systemd[1]: Started Session c161 of User root. Oct 12 14:43:14 np0005481648.novalocal sudo[95224]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:43:15 np0005481648.novalocal sudo[95224]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:15 np0005481648.novalocal systemd[1]: session-c161.scope: Deactivated successfully. Oct 12 14:43:15 np0005481648.novalocal sudo[95233]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc 7JkR2NM8JEDFoAhi2wkU w329wJeyJDQyvAdt iqn.1994-05.com.redhat:6c58e158f1b6 Oct 12 14:43:15 np0005481648.novalocal systemd[1]: Started Session c162 of User root. Oct 12 14:43:15 np0005481648.novalocal sudo[95233]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:43:15 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l d037eef6-d502-43e0-a6a2-a6ebaedfa86e Oct 12 14:43:15 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:15 np0005481648.novalocal sudo[95233]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:15 np0005481648.novalocal systemd[1]: session-c162.scope: Deactivated successfully. Oct 12 14:43:15 np0005481648.novalocal setroubleshoot[95192]: failed to retrieve rpm info for path '/run/blkid/blkid.tab': Oct 12 14:43:15 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l 7e774829-6141-47d4-9dd4-8501c379b82c Oct 12 14:43:15 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:15 np0005481648.novalocal sudo[95241]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 12 14:43:15 np0005481648.novalocal setroubleshoot[95192]: failed to retrieve rpm info for path '/dev/vda1': Oct 12 14:43:16 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 6a565df5-be98-425c-b05e-f25e80bec98f Oct 12 14:43:16 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:16 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l 778dffbd-e3f4-403f-805e-342f54776bb9 Oct 12 14:43:16 np0005481648.novalocal systemd[1]: Started Session c163 of User root. Oct 12 14:43:16 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:16 np0005481648.novalocal sudo[95241]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:43:16 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l fdc0f88a-9ea6-45e0-a92c-efa8a68b86e8 Oct 12 14:43:16 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:16 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 8d6a2410-f8ed-4faf-93d1-166ff91888da Oct 12 14:43:16 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:16 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l 05c22d3f-4309-4483-862a-b8a646a5d6cf Oct 12 14:43:16 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:16 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l 81610047-1aa7-4365-861a-c8623e754dbb Oct 12 14:43:16 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:16 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 94a30548-d688-4452-addc-5051c9438b26 Oct 12 14:43:16 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:16 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l 2cc92859-553f-4cce-a269-69a6ed1b4275 Oct 12 14:43:16 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:16 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-g8DCRM. For complete SELinux messages run: sealert -l 6ae5525b-d440-4ecb-b35d-f9fbc0726c94 Oct 12 14:43:16 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-g8DCRM. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-g8DCRM file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:16 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l d00f204f-253b-4f87-a8a7-82f35de3034e Oct 12 14:43:16 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:16 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l 64b59ed8-967a-40bc-9668-6d95bfd1b446 Oct 12 14:43:16 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:16 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l e47a6ccc-13e9-4d5e-89c2-e8cacebbb503 Oct 12 14:43:16 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:16 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l 31a27fc3-067a-41da-8d39-d9b196a73018 Oct 12 14:43:16 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:16 np0005481648.novalocal sudo[95241]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:16 np0005481648.novalocal systemd[1]: session-c163.scope: Deactivated successfully. Oct 12 14:43:16 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 0c5fb7da-a194-4a34-8670-dafa26280f77 Oct 12 14:43:17 np0005481648.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Oct 12 14:43:17 np0005481648.novalocal iscsid[71266]: iscsid: Connection5:0 to [target: iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc, portal: ::1,3260] through [iface: default] is operational now Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Oct 12 14:43:17 np0005481648.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Oct 12 14:43:17 np0005481648.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Oct 12 14:43:17 np0005481648.novalocal kernel: scsi 2:0:0:0: alua: device naa.600140516fc4fd5868f4e07bd12f8553 port group 0 rel port 1 Oct 12 14:43:17 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Oct 12 14:43:17 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Oct 12 14:43:17 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Oct 12 14:43:17 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Oct 12 14:43:17 np0005481648.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 12 14:43:17 np0005481648.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Oct 12 14:43:17 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Oct 12 14:43:17 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Oct 12 14:43:17 np0005481648.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Oct 12 14:43:17 np0005481648.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Oct 12 14:43:17 np0005481648.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 12 14:43:17 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l c1b3c07c-d6e6-495a-a13e-56ccd588b2c1 Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 685a4654-8042-40e2-b4ba-1a6dd49b053a Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 00522d6b-80dd-4c7a-9b3a-d02d3e5f5998 Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l a6197c96-1e13-44d3-bbd1-f5a281bcb432 Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 401857b9-7d0e-47e4-b46d-1ee05162778c Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 1744f955-5c09-469b-b71a-e3c93f809cbe Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l a780b3cf-b1d0-4961-8229-57f014458614 Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 4d868040-debf-426c-8efc-cb757d051ef1 Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l b5772bfe-3a85-4bdd-9a70-187acae13ea6 Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l d60c043f-d22b-4a1a-91a4-59696d41fe78 Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l e4631b0e-c2fe-4892-8aa4-cc8b6b7365e6 Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 4f66f416-f222-4bc6-9f74-4c489fb45ba1 Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l af67624b-4da4-4835-9be1-d90bf1fb96d5 Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l 646f91dd-0268-44ad-9c7d-8622e7121bdd Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l e0d827d2-501c-4c14-8e33-0842b27a20f3 Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc/::1,3260. For complete SELinux messages run: sealert -l 65a53e64-3060-433b-b339-28b2074d98c5 Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc/::1,3260. For complete SELinux messages run: sealert -l 07827e25-063e-4375-bc1a-06ed64181cd8 Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 130dba21-b7ab-408e-8031-9c380f83effe Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l b5772bfe-3a85-4bdd-9a70-187acae13ea6 Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 1744f955-5c09-469b-b71a-e3c93f809cbe Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l a780b3cf-b1d0-4961-8229-57f014458614 Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l d60c043f-d22b-4a1a-91a4-59696d41fe78 Oct 12 14:43:17 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:18 np0005481648.novalocal sudo[95301]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Oct 12 14:43:18 np0005481648.novalocal systemd[1]: Started Session c164 of User root. Oct 12 14:43:18 np0005481648.novalocal sudo[95301]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Oct 12 14:43:18 np0005481648.novalocal setroubleshoot[95192]: failed to retrieve rpm info for path '/sys/class/scsi_host/host2/scan': Oct 12 14:43:18 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 83135e20-c9ea-41c3-9659-c06c5b32888e Oct 12 14:43:18 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 12 14:43:18 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 64b66845-3656-4fc4-9b92-ef21d08812db Oct 12 14:43:18 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 12 14:43:18 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 2a9cea8e-eba0-4b87-8923-dd58722e28eb Oct 12 14:43:18 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 12 14:43:18 np0005481648.novalocal setroubleshoot[95192]: failed to retrieve rpm info for path '/dev/sda': Oct 12 14:43:18 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 6a565df5-be98-425c-b05e-f25e80bec98f Oct 12 14:43:18 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:18 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 75ba2f2b-b1f0-4e63-be63-acadc8e42a28 Oct 12 14:43:18 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 12 14:43:18 np0005481648.novalocal sudo[95301]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:18 np0005481648.novalocal systemd[1]: session-c164.scope: Deactivated successfully. Oct 12 14:43:18 np0005481648.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 12 14:43:18 np0005481648.novalocal sudo[95313]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Oct 12 14:43:18 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 875f4aa1-fffb-41f2-adf0-dbbe9853c9a2 Oct 12 14:43:18 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 12 14:43:18 np0005481648.novalocal systemd[1]: Started Session c165 of User root. Oct 12 14:43:18 np0005481648.novalocal sudo[95313]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Oct 12 14:43:18 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 84438904-ac82-4875-be3d-66a902591683 Oct 12 14:43:18 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 12 14:43:18 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 539d174a-00ae-462a-8b0b-7fef69181df2 Oct 12 14:43:18 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 12 14:43:18 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l b7186406-04a9-4168-8da7-f87556f6291a Oct 12 14:43:18 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 12 14:43:18 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 6b1045ed-6f90-4e81-a551-0d9b664b0c21 Oct 12 14:43:18 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 12 14:43:18 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l 3a15a085-f59a-4c6a-bd97-12889c5d4c6d Oct 12 14:43:18 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Oct 12 14:43:18 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. For complete SELinux messages run: sealert -l 4bd430f2-bd5f-4e65-9b99-8852fe253227 Oct 12 14:43:18 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 12 14:43:18 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l fdc0f88a-9ea6-45e0-a92c-efa8a68b86e8 Oct 12 14:43:18 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:18 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 8d6a2410-f8ed-4faf-93d1-166ff91888da Oct 12 14:43:18 np0005481648.novalocal sudo[95313]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:18 np0005481648.novalocal systemd[1]: session-c165.scope: Deactivated successfully. Oct 12 14:43:18 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:18 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 00522d6b-80dd-4c7a-9b3a-d02d3e5f5998 Oct 12 14:43:18 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Oct 12 14:43:18 np0005481648.novalocal kernel: scsi 2:0:0:0: alua: Detached Oct 12 14:43:18 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:18 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc/::1,3260. For complete SELinux messages run: sealert -l 07827e25-063e-4375-bc1a-06ed64181cd8 Oct 12 14:43:19 np0005481648.novalocal iscsid[71266]: iscsid: Connection5:0 to [target: iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc, portal: ::1,3260] through [iface: default] is shutdown. Oct 12 14:43:19 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:19 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l a6197c96-1e13-44d3-bbd1-f5a281bcb432 Oct 12 14:43:19 np0005481648.novalocal sudo[95363]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc iqn.1994-05.com.redhat:6c58e158f1b6 Oct 12 14:43:19 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:19 np0005481648.novalocal systemd[1]: Started Session c166 of User root. Oct 12 14:43:19 np0005481648.novalocal sudo[95363]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:43:19 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 401857b9-7d0e-47e4-b46d-1ee05162778c Oct 12 14:43:19 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:19 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 4d868040-debf-426c-8efc-cb757d051ef1 Oct 12 14:43:19 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:19 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 130dba21-b7ab-408e-8031-9c380f83effe Oct 12 14:43:19 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:19 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc/::1,3260. For complete SELinux messages run: sealert -l 97d0fb62-210e-4682-b4c9-37242f4904d0 Oct 12 14:43:19 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:19 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l e4631b0e-c2fe-4892-8aa4-cc8b6b7365e6 Oct 12 14:43:19 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:19 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 0c5fb7da-a194-4a34-8670-dafa26280f77 Oct 12 14:43:19 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 12 14:43:19 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l c1b3c07c-d6e6-495a-a13e-56ccd588b2c1 Oct 12 14:43:19 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 12 14:43:19 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 685a4654-8042-40e2-b4ba-1a6dd49b053a Oct 12 14:43:19 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 12 14:43:19 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l 778dffbd-e3f4-403f-805e-342f54776bb9 Oct 12 14:43:19 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:19 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/bin/tee from append access on the file delete. For complete SELinux messages run: sealert -l 2a9cea8e-eba0-4b87-8923-dd58722e28eb Oct 12 14:43:19 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/bin/tee from append access on the file delete. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the delete file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 12 14:43:19 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l 31a307f5-ccb8-49ce-8048-12ce57210b56 Oct 12 14:43:19 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:19 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc. For complete SELinux messages run: sealert -l 4f66f416-f222-4bc6-9f74-4c489fb45ba1 Oct 12 14:43:19 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:19 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l cb9ec29e-1279-4555-8329-572e5cab3852 Oct 12 14:43:19 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:19 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 8c0c66d4-b763-40d1-bcec-2b8ec0f338a5 Oct 12 14:43:19 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:19 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc. For complete SELinux messages run: sealert -l 12085319-fb02-4e36-a535-32e76142c068 Oct 12 14:43:19 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:19 np0005481648.novalocal sudo[95363]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:19 np0005481648.novalocal systemd[1]: session-c166.scope: Deactivated successfully. Oct 12 14:43:19 np0005481648.novalocal sudo[95372]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 12 14:43:19 np0005481648.novalocal systemd[1]: Started Session c167 of User root. Oct 12 14:43:19 np0005481648.novalocal sudo[95372]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:43:20 np0005481648.novalocal sudo[95372]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:20 np0005481648.novalocal systemd[1]: session-c167.scope: Deactivated successfully. Oct 12 14:43:20 np0005481648.novalocal sudo[95377]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 12 14:43:20 np0005481648.novalocal systemd[1]: Started Session c168 of User root. Oct 12 14:43:20 np0005481648.novalocal sudo[95377]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:43:20 np0005481648.novalocal sudo[95377]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:20 np0005481648.novalocal systemd[1]: session-c168.scope: Deactivated successfully. Oct 12 14:43:20 np0005481648.novalocal sudo[95384]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc Oct 12 14:43:20 np0005481648.novalocal systemd[1]: Started Session c169 of User root. Oct 12 14:43:20 np0005481648.novalocal sudo[95384]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:43:21 np0005481648.novalocal sudo[95384]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:21 np0005481648.novalocal systemd[1]: session-c169.scope: Deactivated successfully. Oct 12 14:43:21 np0005481648.novalocal sudo[95390]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 12 14:43:21 np0005481648.novalocal systemd[1]: Started Session c170 of User root. Oct 12 14:43:21 np0005481648.novalocal sudo[95390]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:43:21 np0005481648.novalocal sudo[95390]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:21 np0005481648.novalocal systemd[1]: session-c170.scope: Deactivated successfully. Oct 12 14:43:22 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l d037eef6-d502-43e0-a6a2-a6ebaedfa86e Oct 12 14:43:22 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:22 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l 7e774829-6141-47d4-9dd4-8501c379b82c Oct 12 14:43:22 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:22 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 6a565df5-be98-425c-b05e-f25e80bec98f Oct 12 14:43:22 np0005481648.novalocal sudo[95423]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-a20f3c85-73c8-4417-bb98-b39aeed233fc Oct 12 14:43:22 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:22 np0005481648.novalocal systemd[1]: Started Session c171 of User root. Oct 12 14:43:22 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l 778dffbd-e3f4-403f-805e-342f54776bb9 Oct 12 14:43:22 np0005481648.novalocal sudo[95423]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:43:22 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:22 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l fdc0f88a-9ea6-45e0-a92c-efa8a68b86e8 Oct 12 14:43:22 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:22 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 8d6a2410-f8ed-4faf-93d1-166ff91888da Oct 12 14:43:22 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:22 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l 05c22d3f-4309-4483-862a-b8a646a5d6cf Oct 12 14:43:22 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:22 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l 81610047-1aa7-4365-861a-c8623e754dbb Oct 12 14:43:22 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:22 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 94a30548-d688-4452-addc-5051c9438b26 Oct 12 14:43:22 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:22 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l 2cc92859-553f-4cce-a269-69a6ed1b4275 Oct 12 14:43:22 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:22 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-L80Xlm. For complete SELinux messages run: sealert -l 6ae5525b-d440-4ecb-b35d-f9fbc0726c94 Oct 12 14:43:22 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-L80Xlm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-L80Xlm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:22 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l d00f204f-253b-4f87-a8a7-82f35de3034e Oct 12 14:43:22 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:22 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l 64b59ed8-967a-40bc-9668-6d95bfd1b446 Oct 12 14:43:22 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:22 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l e47a6ccc-13e9-4d5e-89c2-e8cacebbb503 Oct 12 14:43:22 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:22 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l 31a27fc3-067a-41da-8d39-d9b196a73018 Oct 12 14:43:22 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:23 np0005481648.novalocal sudo[95423]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:23 np0005481648.novalocal systemd[1]: session-c171.scope: Deactivated successfully. Oct 12 14:43:23 np0005481648.novalocal sudo[95429]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-a20f3c85-73c8-4417-bb98-b39aeed233fc iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc 7JkR2NM8JEDFoAhi2wkU w329wJeyJDQyvAdt False -p3260 -a::1 Oct 12 14:43:23 np0005481648.novalocal systemd[1]: Started Session c172 of User root. Oct 12 14:43:23 np0005481648.novalocal sudo[95429]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:43:23 np0005481648.novalocal sudo[95429]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:23 np0005481648.novalocal systemd[1]: session-c172.scope: Deactivated successfully. Oct 12 14:43:23 np0005481648.novalocal sudo[95435]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 12 14:43:23 np0005481648.novalocal systemd[1]: Started Session c173 of User root. Oct 12 14:43:23 np0005481648.novalocal sudo[95435]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:43:24 np0005481648.novalocal sudo[95435]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:24 np0005481648.novalocal systemd[1]: session-c173.scope: Deactivated successfully. Oct 12 14:43:24 np0005481648.novalocal sudo[95441]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 12 14:43:24 np0005481648.novalocal systemd[1]: Started Session c174 of User root. Oct 12 14:43:24 np0005481648.novalocal sudo[95441]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:43:24 np0005481648.novalocal kernel: tapb7e7cc50-97: entered promiscuous mode Oct 12 14:43:24 np0005481648.novalocal NetworkManager[857]: [1760294604.3757] manager: (tapb7e7cc50-97): new Tun device (/org/freedesktop/NetworkManager/Devices/23) Oct 12 14:43:24 np0005481648.novalocal virtqemud[90651]: Domain id=7 name='instance-00000007' uuid=8ba2bc29-4732-46df-a82c-428715cd7892 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Oct 12 14:43:24 np0005481648.novalocal virtqemud[90651]: Domain id=7 name='instance-00000007' uuid=8ba2bc29-4732-46df-a82c-428715cd7892 is tainted: deprecated-config (CPU model 'qemu64') Oct 12 14:43:24 np0005481648.novalocal systemd-machined[87546]: New machine qemu-7-instance-00000007. Oct 12 14:43:24 np0005481648.novalocal systemd[1]: Started Virtual Machine qemu-7-instance-00000007. Oct 12 14:43:24 np0005481648.novalocal systemd-udevd[95462]: Network interface NamePolicy= disabled on kernel command line. Oct 12 14:43:24 np0005481648.novalocal NetworkManager[857]: [1760294604.4925] device (tapb7e7cc50-97): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 12 14:43:24 np0005481648.novalocal NetworkManager[857]: [1760294604.4930] device (tapb7e7cc50-97): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 12 14:43:24 np0005481648.novalocal NetworkManager[857]: [1760294604.5047] manager: (tapd09dc7a2-a0): new Veth device (/org/freedesktop/NetworkManager/Devices/24) Oct 12 14:43:24 np0005481648.novalocal NetworkManager[857]: [1760294604.5762] device (tapd09dc7a2-a0): carrier: link connected Oct 12 14:43:24 np0005481648.novalocal kernel: tapd09dc7a2-a0: entered promiscuous mode Oct 12 14:43:24 np0005481648.novalocal sudo[95509]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-d09dc7a2-af72-4a12-be03-1a3949dc2c6f env PROCESS_TAG=haproxy-d09dc7a2-af72-4a12-be03-1a3949dc2c6f haproxy -f /var/lib/neutron/ovn-metadata-proxy/d09dc7a2-af72-4a12-be03-1a3949dc2c6f.conf Oct 12 14:43:24 np0005481648.novalocal systemd[1]: Started Session c175 of User root. Oct 12 14:43:24 np0005481648.novalocal sudo[95509]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 12 14:43:24 np0005481648.novalocal sudo[95441]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:24 np0005481648.novalocal systemd[1]: session-c174.scope: Deactivated successfully. Oct 12 14:43:24 np0005481648.novalocal sudo[95512]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc 7JkR2NM8JEDFoAhi2wkU w329wJeyJDQyvAdt iqn.1994-05.com.redhat:6c58e158f1b6 Oct 12 14:43:24 np0005481648.novalocal systemd[1]: Started Session c176 of User root. Oct 12 14:43:24 np0005481648.novalocal sudo[95512]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:43:25 np0005481648.novalocal sudo[95509]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:25 np0005481648.novalocal sudo[95512]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:25 np0005481648.novalocal systemd[1]: session-c176.scope: Deactivated successfully. Oct 12 14:43:25 np0005481648.novalocal sudo[95529]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 12 14:43:25 np0005481648.novalocal systemd[1]: Started Session c177 of User root. Oct 12 14:43:25 np0005481648.novalocal sudo[95529]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:43:26 np0005481648.novalocal sudo[95529]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:26 np0005481648.novalocal systemd[1]: session-c177.scope: Deactivated successfully. Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 0c5fb7da-a194-4a34-8670-dafa26280f77 Oct 12 14:43:26 np0005481648.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Oct 12 14:43:26 np0005481648.novalocal iscsid[71266]: iscsid: Connection6:0 to [target: iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc, portal: ::1,3260] through [iface: default] is operational now Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 12 14:43:26 np0005481648.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Oct 12 14:43:26 np0005481648.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Oct 12 14:43:26 np0005481648.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405cecfa74fcd0b45bca01ec2193 port group 0 rel port 1 Oct 12 14:43:26 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Oct 12 14:43:26 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Oct 12 14:43:26 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Oct 12 14:43:26 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Oct 12 14:43:26 np0005481648.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 12 14:43:26 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Oct 12 14:43:26 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Oct 12 14:43:26 np0005481648.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Oct 12 14:43:26 np0005481648.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Oct 12 14:43:26 np0005481648.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Oct 12 14:43:26 np0005481648.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Oct 12 14:43:26 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l c1b3c07c-d6e6-495a-a13e-56ccd588b2c1 Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 685a4654-8042-40e2-b4ba-1a6dd49b053a Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 00522d6b-80dd-4c7a-9b3a-d02d3e5f5998 Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l a6197c96-1e13-44d3-bbd1-f5a281bcb432 Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 401857b9-7d0e-47e4-b46d-1ee05162778c Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 1744f955-5c09-469b-b71a-e3c93f809cbe Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l a780b3cf-b1d0-4961-8229-57f014458614 Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 4d868040-debf-426c-8efc-cb757d051ef1 Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l b5772bfe-3a85-4bdd-9a70-187acae13ea6 Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l d60c043f-d22b-4a1a-91a4-59696d41fe78 Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l e4631b0e-c2fe-4892-8aa4-cc8b6b7365e6 Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 4f66f416-f222-4bc6-9f74-4c489fb45ba1 Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l af67624b-4da4-4835-9be1-d90bf1fb96d5 Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l 646f91dd-0268-44ad-9c7d-8622e7121bdd Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l e0d827d2-501c-4c14-8e33-0842b27a20f3 Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc/::1,3260. For complete SELinux messages run: sealert -l 65a53e64-3060-433b-b339-28b2074d98c5 Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc/::1,3260. For complete SELinux messages run: sealert -l 07827e25-063e-4375-bc1a-06ed64181cd8 Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 130dba21-b7ab-408e-8031-9c380f83effe Oct 12 14:43:26 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:27 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 83135e20-c9ea-41c3-9659-c06c5b32888e Oct 12 14:43:27 np0005481648.novalocal sudo[95577]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Oct 12 14:43:27 np0005481648.novalocal systemd[1]: Started Session c178 of User root. Oct 12 14:43:27 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 12 14:43:27 np0005481648.novalocal sudo[95577]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Oct 12 14:43:27 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 64b66845-3656-4fc4-9b92-ef21d08812db Oct 12 14:43:27 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 12 14:43:27 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 2a9cea8e-eba0-4b87-8923-dd58722e28eb Oct 12 14:43:27 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Oct 12 14:43:27 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 6a565df5-be98-425c-b05e-f25e80bec98f Oct 12 14:43:27 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:27 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 75ba2f2b-b1f0-4e63-be63-acadc8e42a28 Oct 12 14:43:27 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 12 14:43:27 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 875f4aa1-fffb-41f2-adf0-dbbe9853c9a2 Oct 12 14:43:27 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 12 14:43:27 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 84438904-ac82-4875-be3d-66a902591683 Oct 12 14:43:27 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 12 14:43:27 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 539d174a-00ae-462a-8b0b-7fef69181df2 Oct 12 14:43:27 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Oct 12 14:43:27 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l b7186406-04a9-4168-8da7-f87556f6291a Oct 12 14:43:27 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 12 14:43:27 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 6b1045ed-6f90-4e81-a551-0d9b664b0c21 Oct 12 14:43:27 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Oct 12 14:43:27 np0005481648.novalocal sudo[95577]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:27 np0005481648.novalocal systemd[1]: session-c178.scope: Deactivated successfully. Oct 12 14:43:27 np0005481648.novalocal sudo[95582]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Oct 12 14:43:27 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l 3a15a085-f59a-4c6a-bd97-12889c5d4c6d Oct 12 14:43:27 np0005481648.novalocal systemd[1]: Started Session c179 of User root. Oct 12 14:43:27 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Oct 12 14:43:27 np0005481648.novalocal sudo[95582]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Oct 12 14:43:27 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l 778dffbd-e3f4-403f-805e-342f54776bb9 Oct 12 14:43:27 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:27 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l fdc0f88a-9ea6-45e0-a92c-efa8a68b86e8 Oct 12 14:43:27 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:27 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 8d6a2410-f8ed-4faf-93d1-166ff91888da Oct 12 14:43:27 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Oct 12 14:43:28 np0005481648.novalocal sudo[95582]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:28 np0005481648.novalocal systemd[1]: session-c179.scope: Deactivated successfully. Oct 12 14:43:28 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 00522d6b-80dd-4c7a-9b3a-d02d3e5f5998 Oct 12 14:43:28 np0005481648.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Oct 12 14:43:28 np0005481648.novalocal kernel: scsi 2:0:0:0: alua: Detached Oct 12 14:43:28 np0005481648.novalocal iscsid[71266]: iscsid: Connection6:0 to [target: iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc, portal: ::1,3260] through [iface: default] is shutdown. Oct 12 14:43:28 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:28 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. For complete SELinux messages run: sealert -l b5772bfe-3a85-4bdd-9a70-187acae13ea6 Oct 12 14:43:28 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the send_targets directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:28 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 1744f955-5c09-469b-b71a-e3c93f809cbe Oct 12 14:43:28 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:28 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l a780b3cf-b1d0-4961-8229-57f014458614 Oct 12 14:43:28 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:28 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l d60c043f-d22b-4a1a-91a4-59696d41fe78 Oct 12 14:43:28 np0005481648.novalocal sudo[95627]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc iqn.1994-05.com.redhat:6c58e158f1b6 Oct 12 14:43:28 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:28 np0005481648.novalocal systemd[1]: Started Session c180 of User root. Oct 12 14:43:28 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 0c5fb7da-a194-4a34-8670-dafa26280f77 Oct 12 14:43:28 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 12 14:43:28 np0005481648.novalocal sudo[95627]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:43:28 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l c1b3c07c-d6e6-495a-a13e-56ccd588b2c1 Oct 12 14:43:28 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 12 14:43:28 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 685a4654-8042-40e2-b4ba-1a6dd49b053a Oct 12 14:43:28 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Oct 12 14:43:28 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/bin/python3.9 from remove_name access on the directory scsi-1LIO-ORG_IBLOCK:cecfa74f-cd0b-45bc-a01e-c219327ec723. For complete SELinux messages run: sealert -l a80872d4-c087-470d-a0b4-da802a429236 Oct 12 14:43:28 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/bin/python3.9 from remove_name access on the directory scsi-1LIO-ORG_IBLOCK:cecfa74f-cd0b-45bc-a01e-c219327ec723. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed remove_name access on the scsi-1LIO-ORG_IBLOCK:cecfa74f-cd0b-45bc-a01e-c219327ec723 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'privsep-helper' --raw | audit2allow -M my-privsephelper # semodule -X 300 -i my-privsephelper.pp Oct 12 14:43:28 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/bin/python3.9 from unlink access on the lnk_file scsi-1LIO-ORG_IBLOCK:cecfa74f-cd0b-45bc-a01e-c219327ec723. For complete SELinux messages run: sealert -l 5d47b608-c785-4c82-9fff-941b57852004 Oct 12 14:43:28 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/bin/python3.9 from unlink access on the lnk_file scsi-1LIO-ORG_IBLOCK:cecfa74f-cd0b-45bc-a01e-c219327ec723. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed unlink access on the scsi-1LIO-ORG_IBLOCK:cecfa74f-cd0b-45bc-a01e-c219327ec723 lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'privsep-helper' --raw | audit2allow -M my-privsephelper # semodule -X 300 -i my-privsephelper.pp Oct 12 14:43:28 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc. For complete SELinux messages run: sealert -l 4f66f416-f222-4bc6-9f74-4c489fb45ba1 Oct 12 14:43:28 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:28 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l cb9ec29e-1279-4555-8329-572e5cab3852 Oct 12 14:43:28 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:28 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 8c0c66d4-b763-40d1-bcec-2b8ec0f338a5 Oct 12 14:43:28 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:28 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc. For complete SELinux messages run: sealert -l 12085319-fb02-4e36-a535-32e76142c068 Oct 12 14:43:28 np0005481648.novalocal setroubleshoot[95192]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Oct 12 14:43:28 np0005481648.novalocal sudo[95627]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:28 np0005481648.novalocal systemd[1]: session-c180.scope: Deactivated successfully. Oct 12 14:43:28 np0005481648.novalocal sudo[95636]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 12 14:43:28 np0005481648.novalocal systemd[1]: Started Session c181 of User root. Oct 12 14:43:28 np0005481648.novalocal sudo[95636]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:43:29 np0005481648.novalocal sudo[95636]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:29 np0005481648.novalocal systemd[1]: session-c181.scope: Deactivated successfully. Oct 12 14:43:29 np0005481648.novalocal sudo[95641]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 12 14:43:29 np0005481648.novalocal systemd[1]: Started Session c182 of User root. Oct 12 14:43:29 np0005481648.novalocal sudo[95641]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:43:30 np0005481648.novalocal sudo[95641]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:30 np0005481648.novalocal systemd[1]: session-c182.scope: Deactivated successfully. Oct 12 14:43:30 np0005481648.novalocal sudo[95647]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-a20f3c85-73c8-4417-bb98-b39aeed233fc Oct 12 14:43:30 np0005481648.novalocal systemd[1]: Started Session c183 of User root. Oct 12 14:43:30 np0005481648.novalocal sudo[95647]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:43:30 np0005481648.novalocal sudo[95647]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:30 np0005481648.novalocal systemd[1]: session-c183.scope: Deactivated successfully. Oct 12 14:43:30 np0005481648.novalocal sudo[95652]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Oct 12 14:43:30 np0005481648.novalocal systemd[1]: Started Session c184 of User root. Oct 12 14:43:30 np0005481648.novalocal sudo[95652]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:43:31 np0005481648.novalocal sudo[95652]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:31 np0005481648.novalocal systemd[1]: session-c184.scope: Deactivated successfully. Oct 12 14:43:33 np0005481648.novalocal sudo[95657]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Oct 12 14:43:33 np0005481648.novalocal systemd[1]: Started Session c185 of User root. Oct 12 14:43:33 np0005481648.novalocal sudo[95657]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:43:34 np0005481648.novalocal sudo[95657]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:34 np0005481648.novalocal systemd[1]: session-c185.scope: Deactivated successfully. Oct 12 14:43:34 np0005481648.novalocal sudo[95662]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-a20f3c85-73c8-4417-bb98-b39aeed233fc Oct 12 14:43:34 np0005481648.novalocal systemd[1]: Started Session c186 of User root. Oct 12 14:43:34 np0005481648.novalocal sudo[95662]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:43:34 np0005481648.novalocal sudo[95662]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:34 np0005481648.novalocal systemd[1]: session-c186.scope: Deactivated successfully. Oct 12 14:43:34 np0005481648.novalocal sudo[95666]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-a20f3c85-73c8-4417-bb98-b39aeed233fc Oct 12 14:43:34 np0005481648.novalocal systemd[1]: Started Session c187 of User root. Oct 12 14:43:34 np0005481648.novalocal sudo[95666]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:43:35 np0005481648.novalocal sudo[95666]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:35 np0005481648.novalocal systemd[1]: session-c187.scope: Deactivated successfully. Oct 12 14:43:35 np0005481648.novalocal sudo[95670]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-a20f3c85-73c8-4417-bb98-b39aeed233fc Oct 12 14:43:35 np0005481648.novalocal systemd[1]: Started Session c188 of User root. Oct 12 14:43:35 np0005481648.novalocal sudo[95670]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:43:35 np0005481648.novalocal sudo[95675]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:43:35 np0005481648.novalocal systemd[1]: Started Session c189 of User root. Oct 12 14:43:35 np0005481648.novalocal sudo[95675]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:43:35 np0005481648.novalocal lvm[95682]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 12 14:43:35 np0005481648.novalocal lvm[95682]: VG cinder-volumes finished Oct 12 14:43:35 np0005481648.novalocal sudo[95670]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:35 np0005481648.novalocal systemd[1]: session-c188.scope: Deactivated successfully. Oct 12 14:43:35 np0005481648.novalocal sudo[95684]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:43:35 np0005481648.novalocal systemd[1]: Started Session c190 of User root. Oct 12 14:43:35 np0005481648.novalocal sudo[95684]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:43:35 np0005481648.novalocal sudo[95675]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:35 np0005481648.novalocal systemd[1]: session-c189.scope: Deactivated successfully. Oct 12 14:43:35 np0005481648.novalocal sudo[95687]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:43:35 np0005481648.novalocal systemd[1]: Started Session c191 of User root. Oct 12 14:43:35 np0005481648.novalocal sudo[95687]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:43:36 np0005481648.novalocal sudo[95684]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:36 np0005481648.novalocal systemd[1]: session-c190.scope: Deactivated successfully. Oct 12 14:43:36 np0005481648.novalocal sudo[95694]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:43:36 np0005481648.novalocal systemd[1]: Started Session c192 of User root. Oct 12 14:43:36 np0005481648.novalocal sudo[95694]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:43:36 np0005481648.novalocal sudo[95687]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:36 np0005481648.novalocal systemd[1]: session-c191.scope: Deactivated successfully. Oct 12 14:43:36 np0005481648.novalocal sudo[95698]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:43:36 np0005481648.novalocal systemd[1]: Started Session c193 of User root. Oct 12 14:43:36 np0005481648.novalocal sudo[95698]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:43:36 np0005481648.novalocal sudo[95694]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:36 np0005481648.novalocal systemd[1]: session-c192.scope: Deactivated successfully. Oct 12 14:43:36 np0005481648.novalocal sudo[95717]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:43:36 np0005481648.novalocal sudo[95698]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:36 np0005481648.novalocal systemd[1]: Started Session c194 of User root. Oct 12 14:43:36 np0005481648.novalocal systemd[1]: session-c193.scope: Deactivated successfully. Oct 12 14:43:36 np0005481648.novalocal sudo[95717]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:43:36 np0005481648.novalocal sudo[95719]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:43:36 np0005481648.novalocal systemd[1]: Started Session c195 of User root. Oct 12 14:43:36 np0005481648.novalocal sudo[95719]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:43:36 np0005481648.novalocal sudo[95717]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:36 np0005481648.novalocal systemd[1]: session-c194.scope: Deactivated successfully. Oct 12 14:43:36 np0005481648.novalocal sudo[95719]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:36 np0005481648.novalocal sudo[95725]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:43:36 np0005481648.novalocal systemd[1]: session-c195.scope: Deactivated successfully. Oct 12 14:43:37 np0005481648.novalocal systemd[1]: Started Session c196 of User root. Oct 12 14:43:37 np0005481648.novalocal sudo[95725]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:43:37 np0005481648.novalocal sudo[95725]: pam_unix(sudo:session): session closed for user root Oct 12 14:43:37 np0005481648.novalocal systemd[1]: session-c196.scope: Deactivated successfully. Oct 12 14:43:38 np0005481648.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@10.service: Deactivated successfully. Oct 12 14:43:38 np0005481648.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@10.service: Consumed 1.335s CPU time. Oct 12 14:43:38 np0005481648.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 12 14:43:38 np0005481648.novalocal systemd[1]: setroubleshootd.service: Consumed 5.999s CPU time. Oct 12 14:43:45 np0005481648.novalocal haproxy-metadata-proxy-d09dc7a2-af72-4a12-be03-1a3949dc2c6f[95519]: 10.100.0.13:36724 [12/Oct/2025:14:43:45.155] listener listener/metadata 0/0/0/137/137 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Oct 12 14:43:45 np0005481648.novalocal haproxy-metadata-proxy-d09dc7a2-af72-4a12-be03-1a3949dc2c6f[95519]: 10.100.0.13:36734 [12/Oct/2025:14:43:45.368] listener listener/metadata 0/0/0/21/21 200 114 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Oct 12 14:43:45 np0005481648.novalocal haproxy-metadata-proxy-d09dc7a2-af72-4a12-be03-1a3949dc2c6f[95519]: 10.100.0.13:36744 [12/Oct/2025:14:43:45.417] listener listener/metadata 0/0/0/11/11 200 292 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Oct 12 14:43:45 np0005481648.novalocal haproxy-metadata-proxy-d09dc7a2-af72-4a12-be03-1a3949dc2c6f[95519]: 10.100.0.13:36748 [12/Oct/2025:14:43:45.463] listener listener/metadata 0/0/0/10/10 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Oct 12 14:43:45 np0005481648.novalocal haproxy-metadata-proxy-d09dc7a2-af72-4a12-be03-1a3949dc2c6f[95519]: 10.100.0.13:36760 [12/Oct/2025:14:43:45.512] listener listener/metadata 0/0/0/14/14 200 87 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Oct 12 14:43:45 np0005481648.novalocal haproxy-metadata-proxy-d09dc7a2-af72-4a12-be03-1a3949dc2c6f[95519]: 10.100.0.13:36766 [12/Oct/2025:14:43:45.565] listener listener/metadata 0/0/0/9/9 200 93 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Oct 12 14:43:45 np0005481648.novalocal haproxy-metadata-proxy-d09dc7a2-af72-4a12-be03-1a3949dc2c6f[95519]: 10.100.0.13:36770 [12/Oct/2025:14:43:45.612] listener listener/metadata 0/0/0/9/9 200 98 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Oct 12 14:43:45 np0005481648.novalocal haproxy-metadata-proxy-d09dc7a2-af72-4a12-be03-1a3949dc2c6f[95519]: 10.100.0.13:36778 [12/Oct/2025:14:43:45.667] listener listener/metadata 0/0/0/9/9 200 99 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Oct 12 14:43:45 np0005481648.novalocal haproxy-metadata-proxy-d09dc7a2-af72-4a12-be03-1a3949dc2c6f[95519]: 10.100.0.13:36782 [12/Oct/2025:14:43:45.715] listener listener/metadata 0/0/0/10/10 200 144 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Oct 12 14:43:45 np0005481648.novalocal haproxy-metadata-proxy-d09dc7a2-af72-4a12-be03-1a3949dc2c6f[95519]: 10.100.0.13:36786 [12/Oct/2025:14:43:45.764] listener listener/metadata 0/0/0/10/10 200 144 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Oct 12 14:43:45 np0005481648.novalocal haproxy-metadata-proxy-d09dc7a2-af72-4a12-be03-1a3949dc2c6f[95519]: 10.100.0.13:36792 [12/Oct/2025:14:43:45.814] listener listener/metadata 0/0/0/9/9 200 182 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Oct 12 14:43:45 np0005481648.novalocal haproxy-metadata-proxy-d09dc7a2-af72-4a12-be03-1a3949dc2c6f[95519]: 10.100.0.13:36806 [12/Oct/2025:14:43:45.864] listener listener/metadata 0/0/0/8/8 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Oct 12 14:43:45 np0005481648.novalocal haproxy-metadata-proxy-d09dc7a2-af72-4a12-be03-1a3949dc2c6f[95519]: 10.100.0.13:36818 [12/Oct/2025:14:43:45.901] listener listener/metadata 0/0/0/10/10 200 89 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Oct 12 14:43:45 np0005481648.novalocal haproxy-metadata-proxy-d09dc7a2-af72-4a12-be03-1a3949dc2c6f[95519]: 10.100.0.13:36822 [12/Oct/2025:14:43:45.945] listener listener/metadata 0/0/0/12/12 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Oct 12 14:43:46 np0005481648.novalocal haproxy-metadata-proxy-d09dc7a2-af72-4a12-be03-1a3949dc2c6f[95519]: 10.100.0.13:36838 [12/Oct/2025:14:43:45.999] listener listener/metadata 0/0/0/9/9 200 144 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Oct 12 14:43:46 np0005481648.novalocal haproxy-metadata-proxy-d09dc7a2-af72-4a12-be03-1a3949dc2c6f[95519]: 10.100.0.13:36848 [12/Oct/2025:14:43:46.053] listener listener/metadata 0/0/0/11/11 200 90 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Oct 12 14:43:56 np0005481648.novalocal kernel: tapb7e7cc50-97 (unregistering): left promiscuous mode Oct 12 14:43:56 np0005481648.novalocal NetworkManager[857]: [1760294636.6549] device (tapb7e7cc50-97): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Oct 12 14:43:56 np0005481648.novalocal systemd[1]: session-c175.scope: Deactivated successfully. Oct 12 14:43:56 np0005481648.novalocal systemd[1]: machine-qemu\x2d7\x2dinstance\x2d00000007.scope: Deactivated successfully. Oct 12 14:43:56 np0005481648.novalocal systemd[1]: machine-qemu\x2d7\x2dinstance\x2d00000007.scope: Consumed 20.686s CPU time. Oct 12 14:43:56 np0005481648.novalocal systemd-machined[87546]: Machine qemu-7-instance-00000007 terminated. Oct 12 14:43:56 np0005481648.novalocal kernel: tapd09dc7a2-a0: left promiscuous mode Oct 12 14:43:56 np0005481648.novalocal systemd[1]: run-netns-ovnmeta\x2dd09dc7a2\x2daf72\x2d4a12\x2dbe03\x2d1a3949dc2c6f.mount: Deactivated successfully. Oct 12 14:43:59 np0005481648.novalocal kernel: tapb7e7cc50-97: entered promiscuous mode Oct 12 14:43:59 np0005481648.novalocal NetworkManager[857]: [1760294639.8928] manager: (tapb7e7cc50-97): new Tun device (/org/freedesktop/NetworkManager/Devices/25) Oct 12 14:43:59 np0005481648.novalocal virtqemud[90651]: Domain id=8 name='instance-00000007' uuid=8ba2bc29-4732-46df-a82c-428715cd7892 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Oct 12 14:43:59 np0005481648.novalocal virtqemud[90651]: Domain id=8 name='instance-00000007' uuid=8ba2bc29-4732-46df-a82c-428715cd7892 is tainted: deprecated-config (CPU model 'qemu64') Oct 12 14:43:59 np0005481648.novalocal systemd-machined[87546]: New machine qemu-8-instance-00000007. Oct 12 14:43:59 np0005481648.novalocal systemd[1]: Started Virtual Machine qemu-8-instance-00000007. Oct 12 14:44:00 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:44:00 np0005481648.novalocal systemd-udevd[95843]: Network interface NamePolicy= disabled on kernel command line. Oct 12 14:44:00 np0005481648.novalocal NetworkManager[857]: [1760294640.0148] manager: (tapd09dc7a2-a0): new Veth device (/org/freedesktop/NetworkManager/Devices/26) Oct 12 14:44:00 np0005481648.novalocal systemd-udevd[95847]: Network interface NamePolicy= disabled on kernel command line. Oct 12 14:44:00 np0005481648.novalocal NetworkManager[857]: [1760294640.0263] device (tapb7e7cc50-97): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 12 14:44:00 np0005481648.novalocal NetworkManager[857]: [1760294640.0268] device (tapb7e7cc50-97): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 12 14:44:00 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:44:00 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:44:00 np0005481648.novalocal NetworkManager[857]: [1760294640.0651] device (tapd09dc7a2-a0): carrier: link connected Oct 12 14:44:00 np0005481648.novalocal kernel: tapd09dc7a2-a0: entered promiscuous mode Oct 12 14:44:00 np0005481648.novalocal sudo[95887]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-d09dc7a2-af72-4a12-be03-1a3949dc2c6f env PROCESS_TAG=haproxy-d09dc7a2-af72-4a12-be03-1a3949dc2c6f haproxy -f /var/lib/neutron/ovn-metadata-proxy/d09dc7a2-af72-4a12-be03-1a3949dc2c6f.conf Oct 12 14:44:00 np0005481648.novalocal systemd[1]: Started Session c197 of User root. Oct 12 14:44:00 np0005481648.novalocal sudo[95887]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 12 14:44:00 np0005481648.novalocal sudo[95887]: pam_unix(sudo:session): session closed for user root Oct 12 14:44:20 np0005481648.novalocal haproxy-metadata-proxy-d09dc7a2-af72-4a12-be03-1a3949dc2c6f[95892]: 10.100.0.13:54332 [12/Oct/2025:14:44:19.967] listener listener/metadata 0/0/0/903/903 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Oct 12 14:44:20 np0005481648.novalocal haproxy-metadata-proxy-d09dc7a2-af72-4a12-be03-1a3949dc2c6f[95892]: 10.100.0.13:54342 [12/Oct/2025:14:44:20.974] listener listener/metadata 0/0/0/18/18 200 114 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Oct 12 14:44:21 np0005481648.novalocal haproxy-metadata-proxy-d09dc7a2-af72-4a12-be03-1a3949dc2c6f[95892]: 10.100.0.13:54354 [12/Oct/2025:14:44:21.048] listener listener/metadata 0/0/0/10/10 200 292 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Oct 12 14:44:21 np0005481648.novalocal haproxy-metadata-proxy-d09dc7a2-af72-4a12-be03-1a3949dc2c6f[95892]: 10.100.0.13:54366 [12/Oct/2025:14:44:21.121] listener listener/metadata 0/0/0/10/10 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Oct 12 14:44:21 np0005481648.novalocal haproxy-metadata-proxy-d09dc7a2-af72-4a12-be03-1a3949dc2c6f[95892]: 10.100.0.13:54368 [12/Oct/2025:14:44:21.185] listener listener/metadata 0/0/0/10/10 200 87 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Oct 12 14:44:21 np0005481648.novalocal haproxy-metadata-proxy-d09dc7a2-af72-4a12-be03-1a3949dc2c6f[95892]: 10.100.0.13:54380 [12/Oct/2025:14:44:21.247] listener listener/metadata 0/0/0/11/11 200 93 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Oct 12 14:44:21 np0005481648.novalocal haproxy-metadata-proxy-d09dc7a2-af72-4a12-be03-1a3949dc2c6f[95892]: 10.100.0.13:54382 [12/Oct/2025:14:44:21.311] listener listener/metadata 0/0/0/10/10 200 98 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Oct 12 14:44:21 np0005481648.novalocal haproxy-metadata-proxy-d09dc7a2-af72-4a12-be03-1a3949dc2c6f[95892]: 10.100.0.13:54398 [12/Oct/2025:14:44:21.362] listener listener/metadata 0/0/0/8/8 200 99 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Oct 12 14:44:21 np0005481648.novalocal haproxy-metadata-proxy-d09dc7a2-af72-4a12-be03-1a3949dc2c6f[95892]: 10.100.0.13:54410 [12/Oct/2025:14:44:21.410] listener listener/metadata 0/0/0/9/9 200 144 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Oct 12 14:44:21 np0005481648.novalocal haproxy-metadata-proxy-d09dc7a2-af72-4a12-be03-1a3949dc2c6f[95892]: 10.100.0.13:54416 [12/Oct/2025:14:44:21.458] listener listener/metadata 0/0/0/8/8 200 144 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Oct 12 14:44:21 np0005481648.novalocal haproxy-metadata-proxy-d09dc7a2-af72-4a12-be03-1a3949dc2c6f[95892]: 10.100.0.13:54422 [12/Oct/2025:14:44:21.506] listener listener/metadata 0/0/0/10/10 200 182 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Oct 12 14:44:21 np0005481648.novalocal haproxy-metadata-proxy-d09dc7a2-af72-4a12-be03-1a3949dc2c6f[95892]: 10.100.0.13:54434 [12/Oct/2025:14:44:21.560] listener listener/metadata 0/0/0/12/12 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Oct 12 14:44:21 np0005481648.novalocal haproxy-metadata-proxy-d09dc7a2-af72-4a12-be03-1a3949dc2c6f[95892]: 10.100.0.13:54440 [12/Oct/2025:14:44:21.605] listener listener/metadata 0/0/0/11/11 200 89 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Oct 12 14:44:21 np0005481648.novalocal haproxy-metadata-proxy-d09dc7a2-af72-4a12-be03-1a3949dc2c6f[95892]: 10.100.0.13:54456 [12/Oct/2025:14:44:21.645] listener listener/metadata 0/0/0/8/8 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Oct 12 14:44:21 np0005481648.novalocal haproxy-metadata-proxy-d09dc7a2-af72-4a12-be03-1a3949dc2c6f[95892]: 10.100.0.13:54464 [12/Oct/2025:14:44:21.692] listener listener/metadata 0/0/0/11/11 200 144 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Oct 12 14:44:21 np0005481648.novalocal haproxy-metadata-proxy-d09dc7a2-af72-4a12-be03-1a3949dc2c6f[95892]: 10.100.0.13:54478 [12/Oct/2025:14:44:21.740] listener listener/metadata 0/0/0/10/10 200 90 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Oct 12 14:44:35 np0005481648.novalocal sudo[95980]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:44:35 np0005481648.novalocal systemd[1]: Started Session c198 of User root. Oct 12 14:44:35 np0005481648.novalocal sudo[95980]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:44:35 np0005481648.novalocal sudo[95980]: pam_unix(sudo:session): session closed for user root Oct 12 14:44:35 np0005481648.novalocal systemd[1]: session-c198.scope: Deactivated successfully. Oct 12 14:44:35 np0005481648.novalocal sudo[95985]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:44:35 np0005481648.novalocal systemd[1]: Started Session c199 of User root. Oct 12 14:44:35 np0005481648.novalocal sudo[95985]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:44:36 np0005481648.novalocal sudo[95985]: pam_unix(sudo:session): session closed for user root Oct 12 14:44:36 np0005481648.novalocal systemd[1]: session-c199.scope: Deactivated successfully. Oct 12 14:44:36 np0005481648.novalocal sudo[95989]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:44:36 np0005481648.novalocal systemd[1]: Started Session c200 of User root. Oct 12 14:44:36 np0005481648.novalocal sudo[95989]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:44:36 np0005481648.novalocal sudo[95989]: pam_unix(sudo:session): session closed for user root Oct 12 14:44:36 np0005481648.novalocal systemd[1]: session-c200.scope: Deactivated successfully. Oct 12 14:44:36 np0005481648.novalocal sudo[95993]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:44:36 np0005481648.novalocal systemd[1]: Started Session c201 of User root. Oct 12 14:44:36 np0005481648.novalocal sudo[95993]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:44:36 np0005481648.novalocal kernel: tapb7e7cc50-97 (unregistering): left promiscuous mode Oct 12 14:44:36 np0005481648.novalocal NetworkManager[857]: [1760294676.8341] device (tapb7e7cc50-97): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Oct 12 14:44:36 np0005481648.novalocal systemd[1]: machine-qemu\x2d8\x2dinstance\x2d00000007.scope: Deactivated successfully. Oct 12 14:44:36 np0005481648.novalocal systemd[1]: machine-qemu\x2d8\x2dinstance\x2d00000007.scope: Consumed 21.249s CPU time. Oct 12 14:44:36 np0005481648.novalocal systemd-machined[87546]: Machine qemu-8-instance-00000007 terminated. Oct 12 14:44:36 np0005481648.novalocal kernel: tapd09dc7a2-a0: left promiscuous mode Oct 12 14:44:36 np0005481648.novalocal systemd[1]: run-netns-ovnmeta\x2dd09dc7a2\x2daf72\x2d4a12\x2dbe03\x2d1a3949dc2c6f.mount: Deactivated successfully. Oct 12 14:44:36 np0005481648.novalocal systemd[1]: session-c197.scope: Deactivated successfully. Oct 12 14:44:37 np0005481648.novalocal sudo[95993]: pam_unix(sudo:session): session closed for user root Oct 12 14:44:37 np0005481648.novalocal systemd[1]: session-c201.scope: Deactivated successfully. Oct 12 14:44:37 np0005481648.novalocal kernel: tapb7e7cc50-97: entered promiscuous mode Oct 12 14:44:37 np0005481648.novalocal NetworkManager[857]: [1760294677.0399] manager: (tapb7e7cc50-97): new Tun device (/org/freedesktop/NetworkManager/Devices/27) Oct 12 14:44:37 np0005481648.novalocal kernel: tapb7e7cc50-97 (unregistering): left promiscuous mode Oct 12 14:44:37 np0005481648.novalocal systemd-udevd[96006]: Network interface NamePolicy= disabled on kernel command line. Oct 12 14:44:37 np0005481648.novalocal NetworkManager[857]: [1760294677.1467] manager: (tapd09dc7a2-a0): new Veth device (/org/freedesktop/NetworkManager/Devices/28) Oct 12 14:44:37 np0005481648.novalocal NetworkManager[857]: [1760294677.2113] device (tapd09dc7a2-a0): carrier: link connected Oct 12 14:44:37 np0005481648.novalocal kernel: tapd09dc7a2-a0: entered promiscuous mode Oct 12 14:44:37 np0005481648.novalocal sudo[96066]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-d09dc7a2-af72-4a12-be03-1a3949dc2c6f env PROCESS_TAG=haproxy-d09dc7a2-af72-4a12-be03-1a3949dc2c6f haproxy -f /var/lib/neutron/ovn-metadata-proxy/d09dc7a2-af72-4a12-be03-1a3949dc2c6f.conf Oct 12 14:44:37 np0005481648.novalocal systemd[1]: Started Session c202 of User root. Oct 12 14:44:37 np0005481648.novalocal sudo[96066]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 12 14:44:37 np0005481648.novalocal sudo[96066]: pam_unix(sudo:session): session closed for user root Oct 12 14:44:37 np0005481648.novalocal systemd[1]: session-c202.scope: Deactivated successfully. Oct 12 14:44:37 np0005481648.novalocal kernel: tapd09dc7a2-a0: left promiscuous mode Oct 12 14:44:37 np0005481648.novalocal systemd[1]: run-netns-ovnmeta\x2dd09dc7a2\x2daf72\x2d4a12\x2dbe03\x2d1a3949dc2c6f.mount: Deactivated successfully. Oct 12 14:45:03 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:45:03 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:45:03 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:45:04 np0005481648.novalocal sudo[96104]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-bc627467-e936-4cbf-94c5-21c7831e5f93 cinder-volumes/cinder-volumes-pool Oct 12 14:45:04 np0005481648.novalocal systemd[1]: Started Session c203 of User root. Oct 12 14:45:04 np0005481648.novalocal sudo[96104]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:45:05 np0005481648.novalocal lvm[96117]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 12 14:45:05 np0005481648.novalocal lvm[96117]: VG cinder-volumes finished Oct 12 14:45:05 np0005481648.novalocal sudo[96104]: pam_unix(sudo:session): session closed for user root Oct 12 14:45:05 np0005481648.novalocal systemd[1]: session-c203.scope: Deactivated successfully. Oct 12 14:45:17 np0005481648.novalocal kernel: tapf79afb3c-85: entered promiscuous mode Oct 12 14:45:17 np0005481648.novalocal NetworkManager[857]: [1760294717.0272] manager: (tapf79afb3c-85): new Tun device (/org/freedesktop/NetworkManager/Devices/29) Oct 12 14:45:17 np0005481648.novalocal virtqemud[90651]: Domain id=9 name='instance-00000008' uuid=11826eb2-ea53-471c-929a-2a597c2458d8 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Oct 12 14:45:17 np0005481648.novalocal virtqemud[90651]: Domain id=9 name='instance-00000008' uuid=11826eb2-ea53-471c-929a-2a597c2458d8 is tainted: deprecated-config (CPU model 'qemu64') Oct 12 14:45:17 np0005481648.novalocal systemd-machined[87546]: New machine qemu-9-instance-00000008. Oct 12 14:45:17 np0005481648.novalocal systemd-udevd[96192]: Network interface NamePolicy= disabled on kernel command line. Oct 12 14:45:17 np0005481648.novalocal NetworkManager[857]: [1760294717.0997] device (tapf79afb3c-85): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 12 14:45:17 np0005481648.novalocal NetworkManager[857]: [1760294717.1011] device (tapf79afb3c-85): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 12 14:45:17 np0005481648.novalocal systemd[1]: Started Virtual Machine qemu-9-instance-00000008. Oct 12 14:45:17 np0005481648.novalocal NetworkManager[857]: [1760294717.1573] manager: (tapb105d6ff-c0): new Veth device (/org/freedesktop/NetworkManager/Devices/30) Oct 12 14:45:17 np0005481648.novalocal NetworkManager[857]: [1760294717.2212] device (tapb105d6ff-c0): carrier: link connected Oct 12 14:45:17 np0005481648.novalocal kernel: tapb105d6ff-c0: entered promiscuous mode Oct 12 14:45:17 np0005481648.novalocal sudo[96238]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-b105d6ff-ce30-4948-b615-976ecf2d4d89 env PROCESS_TAG=haproxy-b105d6ff-ce30-4948-b615-976ecf2d4d89 haproxy -f /var/lib/neutron/ovn-metadata-proxy/b105d6ff-ce30-4948-b615-976ecf2d4d89.conf Oct 12 14:45:17 np0005481648.novalocal systemd[1]: Started Session c204 of User root. Oct 12 14:45:17 np0005481648.novalocal sudo[96238]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 12 14:45:17 np0005481648.novalocal sudo[96238]: pam_unix(sudo:session): session closed for user root Oct 12 14:45:30 np0005481648.novalocal kernel: tapf79afb3c-85 (unregistering): left promiscuous mode Oct 12 14:45:30 np0005481648.novalocal NetworkManager[857]: [1760294730.2517] device (tapf79afb3c-85): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Oct 12 14:45:30 np0005481648.novalocal systemd[1]: machine-qemu\x2d9\x2dinstance\x2d00000008.scope: Deactivated successfully. Oct 12 14:45:30 np0005481648.novalocal systemd[1]: machine-qemu\x2d9\x2dinstance\x2d00000008.scope: Consumed 13.161s CPU time. Oct 12 14:45:30 np0005481648.novalocal systemd[1]: session-c204.scope: Deactivated successfully. Oct 12 14:45:30 np0005481648.novalocal systemd-machined[87546]: Machine qemu-9-instance-00000008 terminated. Oct 12 14:45:30 np0005481648.novalocal kernel: tapb105d6ff-c0: left promiscuous mode Oct 12 14:45:30 np0005481648.novalocal systemd[1]: run-netns-ovnmeta\x2db105d6ff\x2dce30\x2d4948\x2db615\x2d976ecf2d4d89.mount: Deactivated successfully. Oct 12 14:45:35 np0005481648.novalocal sudo[96325]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:45:35 np0005481648.novalocal systemd[1]: Started Session c205 of User root. Oct 12 14:45:35 np0005481648.novalocal sudo[96325]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:45:35 np0005481648.novalocal sudo[96325]: pam_unix(sudo:session): session closed for user root Oct 12 14:45:35 np0005481648.novalocal systemd[1]: session-c205.scope: Deactivated successfully. Oct 12 14:45:35 np0005481648.novalocal sudo[96329]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:45:35 np0005481648.novalocal systemd[1]: Started Session c206 of User root. Oct 12 14:45:35 np0005481648.novalocal sudo[96329]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:45:36 np0005481648.novalocal sudo[96329]: pam_unix(sudo:session): session closed for user root Oct 12 14:45:36 np0005481648.novalocal systemd[1]: session-c206.scope: Deactivated successfully. Oct 12 14:45:36 np0005481648.novalocal sudo[96333]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:45:36 np0005481648.novalocal systemd[1]: Started Session c207 of User root. Oct 12 14:45:36 np0005481648.novalocal sudo[96333]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:45:36 np0005481648.novalocal sudo[96333]: pam_unix(sudo:session): session closed for user root Oct 12 14:45:36 np0005481648.novalocal systemd[1]: session-c207.scope: Deactivated successfully. Oct 12 14:45:36 np0005481648.novalocal sudo[96337]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:45:36 np0005481648.novalocal systemd[1]: Started Session c208 of User root. Oct 12 14:45:36 np0005481648.novalocal sudo[96337]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:45:37 np0005481648.novalocal sudo[96337]: pam_unix(sudo:session): session closed for user root Oct 12 14:45:37 np0005481648.novalocal systemd[1]: session-c208.scope: Deactivated successfully. Oct 12 14:45:39 np0005481648.novalocal sudo[96349]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-bc627467-e936-4cbf-94c5-21c7831e5f93 Oct 12 14:45:39 np0005481648.novalocal systemd[1]: Started Session c209 of User root. Oct 12 14:45:39 np0005481648.novalocal sudo[96349]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:45:39 np0005481648.novalocal sudo[96349]: pam_unix(sudo:session): session closed for user root Oct 12 14:45:39 np0005481648.novalocal systemd[1]: session-c209.scope: Deactivated successfully. Oct 12 14:45:39 np0005481648.novalocal sudo[96353]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-bc627467-e936-4cbf-94c5-21c7831e5f93 Oct 12 14:45:39 np0005481648.novalocal systemd[1]: Started Session c210 of User root. Oct 12 14:45:39 np0005481648.novalocal sudo[96353]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:45:40 np0005481648.novalocal sudo[96353]: pam_unix(sudo:session): session closed for user root Oct 12 14:45:40 np0005481648.novalocal systemd[1]: session-c210.scope: Deactivated successfully. Oct 12 14:45:40 np0005481648.novalocal sudo[96358]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-bc627467-e936-4cbf-94c5-21c7831e5f93 Oct 12 14:45:40 np0005481648.novalocal systemd[1]: Started Session c211 of User root. Oct 12 14:45:40 np0005481648.novalocal sudo[96358]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:45:40 np0005481648.novalocal lvm[96366]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 12 14:45:40 np0005481648.novalocal lvm[96366]: VG cinder-volumes finished Oct 12 14:45:40 np0005481648.novalocal sudo[96358]: pam_unix(sudo:session): session closed for user root Oct 12 14:45:40 np0005481648.novalocal systemd[1]: session-c211.scope: Deactivated successfully. Oct 12 14:45:40 np0005481648.novalocal sudo[96367]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:45:40 np0005481648.novalocal systemd[1]: Started Session c212 of User root. Oct 12 14:45:40 np0005481648.novalocal sudo[96367]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:45:41 np0005481648.novalocal sudo[96367]: pam_unix(sudo:session): session closed for user root Oct 12 14:45:41 np0005481648.novalocal systemd[1]: session-c212.scope: Deactivated successfully. Oct 12 14:45:41 np0005481648.novalocal sudo[96371]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:45:41 np0005481648.novalocal systemd[1]: Started Session c213 of User root. Oct 12 14:45:41 np0005481648.novalocal sudo[96371]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:45:41 np0005481648.novalocal sudo[96371]: pam_unix(sudo:session): session closed for user root Oct 12 14:45:41 np0005481648.novalocal systemd[1]: session-c213.scope: Deactivated successfully. Oct 12 14:45:41 np0005481648.novalocal sudo[96376]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:45:41 np0005481648.novalocal systemd[1]: Started Session c214 of User root. Oct 12 14:45:41 np0005481648.novalocal sudo[96376]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:45:42 np0005481648.novalocal sudo[96376]: pam_unix(sudo:session): session closed for user root Oct 12 14:45:42 np0005481648.novalocal systemd[1]: session-c214.scope: Deactivated successfully. Oct 12 14:45:42 np0005481648.novalocal sudo[96380]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:45:42 np0005481648.novalocal systemd[1]: Started Session c215 of User root. Oct 12 14:45:42 np0005481648.novalocal sudo[96380]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:45:42 np0005481648.novalocal sudo[96380]: pam_unix(sudo:session): session closed for user root Oct 12 14:45:42 np0005481648.novalocal systemd[1]: session-c215.scope: Deactivated successfully. Oct 12 14:46:06 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:46:06 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:46:06 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:46:14 np0005481648.novalocal kernel: tapb9b1eecd-2c: entered promiscuous mode Oct 12 14:46:14 np0005481648.novalocal NetworkManager[857]: [1760294774.1893] manager: (tapb9b1eecd-2c): new Tun device (/org/freedesktop/NetworkManager/Devices/31) Oct 12 14:46:14 np0005481648.novalocal virtqemud[90651]: Domain id=10 name='instance-00000009' uuid=d93c55c7-0a83-4c13-b4c3-8a0c8d0b3c55 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Oct 12 14:46:14 np0005481648.novalocal virtqemud[90651]: Domain id=10 name='instance-00000009' uuid=d93c55c7-0a83-4c13-b4c3-8a0c8d0b3c55 is tainted: deprecated-config (CPU model 'qemu64') Oct 12 14:46:14 np0005481648.novalocal systemd-machined[87546]: New machine qemu-10-instance-00000009. Oct 12 14:46:14 np0005481648.novalocal systemd[1]: Started Virtual Machine qemu-10-instance-00000009. Oct 12 14:46:14 np0005481648.novalocal systemd-udevd[96484]: Network interface NamePolicy= disabled on kernel command line. Oct 12 14:46:14 np0005481648.novalocal NetworkManager[857]: [1760294774.3138] manager: (tap9edf6fc5-60): new Veth device (/org/freedesktop/NetworkManager/Devices/32) Oct 12 14:46:14 np0005481648.novalocal systemd-udevd[96491]: Network interface NamePolicy= disabled on kernel command line. Oct 12 14:46:14 np0005481648.novalocal NetworkManager[857]: [1760294774.3197] device (tapb9b1eecd-2c): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 12 14:46:14 np0005481648.novalocal NetworkManager[857]: [1760294774.3208] device (tapb9b1eecd-2c): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 12 14:46:14 np0005481648.novalocal NetworkManager[857]: [1760294774.3702] device (tap9edf6fc5-60): carrier: link connected Oct 12 14:46:14 np0005481648.novalocal kernel: tap9edf6fc5-60: entered promiscuous mode Oct 12 14:46:14 np0005481648.novalocal sudo[96525]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-9edf6fc5-6400-4804-8e78-3562cd73fd9b env PROCESS_TAG=haproxy-9edf6fc5-6400-4804-8e78-3562cd73fd9b haproxy -f /var/lib/neutron/ovn-metadata-proxy/9edf6fc5-6400-4804-8e78-3562cd73fd9b.conf Oct 12 14:46:14 np0005481648.novalocal systemd[1]: Started Session c216 of User root. Oct 12 14:46:14 np0005481648.novalocal sudo[96525]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 12 14:46:14 np0005481648.novalocal sudo[96525]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:36 np0005481648.novalocal sudo[96592]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-628cbce2-df16-4970-acb5-e7f7984c3c7d cinder-volumes/cinder-volumes-pool Oct 12 14:46:36 np0005481648.novalocal systemd[1]: Started Session c217 of User root. Oct 12 14:46:36 np0005481648.novalocal sudo[96592]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:36 np0005481648.novalocal lvm[96603]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 12 14:46:36 np0005481648.novalocal lvm[96603]: VG cinder-volumes finished Oct 12 14:46:36 np0005481648.novalocal sudo[96592]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:36 np0005481648.novalocal systemd[1]: session-c217.scope: Deactivated successfully. Oct 12 14:46:37 np0005481648.novalocal sudo[96604]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-9bf9cc76-96b6-45b7-abba-db4db5db2740 cinder-volumes/cinder-volumes-pool Oct 12 14:46:37 np0005481648.novalocal systemd[1]: Started Session c218 of User root. Oct 12 14:46:37 np0005481648.novalocal sudo[96604]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:38 np0005481648.novalocal lvm[96613]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 12 14:46:38 np0005481648.novalocal lvm[96613]: VG cinder-volumes finished Oct 12 14:46:38 np0005481648.novalocal sudo[96604]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:38 np0005481648.novalocal systemd[1]: session-c218.scope: Deactivated successfully. Oct 12 14:46:39 np0005481648.novalocal sudo[96614]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-9bf9cc76-96b6-45b7-abba-db4db5db2740 Oct 12 14:46:39 np0005481648.novalocal systemd[1]: Started Session c219 of User root. Oct 12 14:46:39 np0005481648.novalocal sudo[96614]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:39 np0005481648.novalocal sudo[96614]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:39 np0005481648.novalocal systemd[1]: session-c219.scope: Deactivated successfully. Oct 12 14:46:39 np0005481648.novalocal sudo[96619]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-9bf9cc76-96b6-45b7-abba-db4db5db2740 Oct 12 14:46:39 np0005481648.novalocal systemd[1]: Started Session c220 of User root. Oct 12 14:46:39 np0005481648.novalocal sudo[96619]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:39 np0005481648.novalocal sudo[96619]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:39 np0005481648.novalocal systemd[1]: session-c220.scope: Deactivated successfully. Oct 12 14:46:39 np0005481648.novalocal sudo[96625]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-9bf9cc76-96b6-45b7-abba-db4db5db2740 Oct 12 14:46:39 np0005481648.novalocal systemd[1]: Started Session c221 of User root. Oct 12 14:46:39 np0005481648.novalocal sudo[96625]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:40 np0005481648.novalocal lvm[96633]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 12 14:46:40 np0005481648.novalocal lvm[96633]: VG cinder-volumes finished Oct 12 14:46:40 np0005481648.novalocal sudo[96625]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:40 np0005481648.novalocal systemd[1]: session-c221.scope: Deactivated successfully. Oct 12 14:46:40 np0005481648.novalocal sudo[96634]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:46:40 np0005481648.novalocal systemd[1]: Started Session c222 of User root. Oct 12 14:46:40 np0005481648.novalocal sudo[96634]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:40 np0005481648.novalocal sudo[96634]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:40 np0005481648.novalocal systemd[1]: session-c222.scope: Deactivated successfully. Oct 12 14:46:40 np0005481648.novalocal sudo[96641]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:46:40 np0005481648.novalocal systemd[1]: Started Session c223 of User root. Oct 12 14:46:40 np0005481648.novalocal sudo[96641]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:41 np0005481648.novalocal haproxy-metadata-proxy-9edf6fc5-6400-4804-8e78-3562cd73fd9b[96530]: 10.100.0.8:51776 [12/Oct/2025:14:46:41.025] listener listener/metadata 0/0/0/102/102 200 98 - - ---- 1/1/0/0/0 0/0 "GET /latest/meta-data/public-ipv4 HTTP/1.1" Oct 12 14:46:41 np0005481648.novalocal sudo[96653]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-628cbce2-df16-4970-acb5-e7f7984c3c7d Oct 12 14:46:41 np0005481648.novalocal sudo[96641]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:41 np0005481648.novalocal systemd[1]: Started Session c224 of User root. Oct 12 14:46:41 np0005481648.novalocal systemd[1]: session-c223.scope: Deactivated successfully. Oct 12 14:46:41 np0005481648.novalocal sudo[96653]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:41 np0005481648.novalocal sudo[96658]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:46:41 np0005481648.novalocal systemd[1]: Started Session c225 of User root. Oct 12 14:46:41 np0005481648.novalocal sudo[96658]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:41 np0005481648.novalocal sudo[96653]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:41 np0005481648.novalocal systemd[1]: session-c224.scope: Deactivated successfully. Oct 12 14:46:41 np0005481648.novalocal sudo[96665]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-628cbce2-df16-4970-acb5-e7f7984c3c7d Oct 12 14:46:41 np0005481648.novalocal systemd[1]: Started Session c226 of User root. Oct 12 14:46:41 np0005481648.novalocal sudo[96658]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:41 np0005481648.novalocal systemd[1]: session-c225.scope: Deactivated successfully. Oct 12 14:46:41 np0005481648.novalocal sudo[96665]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:41 np0005481648.novalocal haproxy-metadata-proxy-9edf6fc5-6400-4804-8e78-3562cd73fd9b[96530]: 10.100.0.8:51792 [12/Oct/2025:14:46:41.368] listener listener/metadata 0/0/0/226/226 200 85 - - ---- 1/1/0/0/0 0/0 "POST /openstack/2013-10-17/password HTTP/1.1" Oct 12 14:46:41 np0005481648.novalocal sudo[96668]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:46:41 np0005481648.novalocal systemd[1]: Started Session c227 of User root. Oct 12 14:46:41 np0005481648.novalocal sudo[96668]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:41 np0005481648.novalocal sudo[96665]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:41 np0005481648.novalocal systemd[1]: session-c226.scope: Deactivated successfully. Oct 12 14:46:41 np0005481648.novalocal sudo[96677]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-628cbce2-df16-4970-acb5-e7f7984c3c7d Oct 12 14:46:41 np0005481648.novalocal sudo[96668]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:41 np0005481648.novalocal systemd[1]: Started Session c228 of User root. Oct 12 14:46:41 np0005481648.novalocal systemd[1]: session-c227.scope: Deactivated successfully. Oct 12 14:46:41 np0005481648.novalocal sudo[96677]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:42 np0005481648.novalocal lvm[96686]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 12 14:46:42 np0005481648.novalocal lvm[96686]: VG cinder-volumes finished Oct 12 14:46:42 np0005481648.novalocal sudo[96677]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:42 np0005481648.novalocal systemd[1]: session-c228.scope: Deactivated successfully. Oct 12 14:46:42 np0005481648.novalocal sudo[96687]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:46:42 np0005481648.novalocal systemd[1]: Started Session c229 of User root. Oct 12 14:46:42 np0005481648.novalocal sudo[96687]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:42 np0005481648.novalocal sudo[96687]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:42 np0005481648.novalocal systemd[1]: session-c229.scope: Deactivated successfully. Oct 12 14:46:42 np0005481648.novalocal sudo[96695]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:46:42 np0005481648.novalocal systemd[1]: Started Session c230 of User root. Oct 12 14:46:42 np0005481648.novalocal sudo[96695]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:43 np0005481648.novalocal sudo[96695]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:43 np0005481648.novalocal systemd[1]: session-c230.scope: Deactivated successfully. Oct 12 14:46:43 np0005481648.novalocal sudo[96703]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:46:43 np0005481648.novalocal systemd[1]: Started Session c231 of User root. Oct 12 14:46:43 np0005481648.novalocal sudo[96703]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:43 np0005481648.novalocal sudo[96703]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:43 np0005481648.novalocal systemd[1]: session-c231.scope: Deactivated successfully. Oct 12 14:46:43 np0005481648.novalocal sudo[96707]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:46:43 np0005481648.novalocal systemd[1]: Started Session c232 of User root. Oct 12 14:46:43 np0005481648.novalocal sudo[96707]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:43 np0005481648.novalocal sudo[96707]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:43 np0005481648.novalocal systemd[1]: session-c232.scope: Deactivated successfully. Oct 12 14:46:44 np0005481648.novalocal sudo[96715]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-679f980e-859b-4f86-951a-5a764e8b682c Oct 12 14:46:44 np0005481648.novalocal systemd[1]: Started Session c233 of User root. Oct 12 14:46:44 np0005481648.novalocal sudo[96715]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:44 np0005481648.novalocal sudo[96715]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:44 np0005481648.novalocal systemd[1]: session-c233.scope: Deactivated successfully. Oct 12 14:46:44 np0005481648.novalocal sudo[96719]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate --name volume-6b886186-73b9-4936-b58e-2ffce0a11173 --snapshot cinder-volumes/volume-679f980e-859b-4f86-951a-5a764e8b682c Oct 12 14:46:44 np0005481648.novalocal systemd[1]: Started Session c234 of User root. Oct 12 14:46:44 np0005481648.novalocal sudo[96719]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:45 np0005481648.novalocal dmeventd[85941]: No longer monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Oct 12 14:46:45 np0005481648.novalocal dmeventd[85941]: Monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Oct 12 14:46:45 np0005481648.novalocal lvm[96729]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 12 14:46:45 np0005481648.novalocal lvm[96729]: VG cinder-volumes finished Oct 12 14:46:45 np0005481648.novalocal sudo[96719]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:45 np0005481648.novalocal systemd[1]: session-c234.scope: Deactivated successfully. Oct 12 14:46:45 np0005481648.novalocal sudo[96730]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -k n cinder-volumes/volume-6b886186-73b9-4936-b58e-2ffce0a11173 Oct 12 14:46:45 np0005481648.novalocal systemd[1]: Started Session c235 of User root. Oct 12 14:46:45 np0005481648.novalocal sudo[96730]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:45 np0005481648.novalocal kernel: tapb9b1eecd-2c (unregistering): left promiscuous mode Oct 12 14:46:45 np0005481648.novalocal NetworkManager[857]: [1760294805.3507] device (tapb9b1eecd-2c): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Oct 12 14:46:45 np0005481648.novalocal systemd[1]: machine-qemu\x2d10\x2dinstance\x2d00000009.scope: Deactivated successfully. Oct 12 14:46:45 np0005481648.novalocal systemd[1]: machine-qemu\x2d10\x2dinstance\x2d00000009.scope: Consumed 24.399s CPU time. Oct 12 14:46:45 np0005481648.novalocal systemd-machined[87546]: Machine qemu-10-instance-00000009 terminated. Oct 12 14:46:45 np0005481648.novalocal kernel: tap9edf6fc5-60: left promiscuous mode Oct 12 14:46:45 np0005481648.novalocal systemd[1]: session-c216.scope: Deactivated successfully. Oct 12 14:46:45 np0005481648.novalocal systemd[1]: run-netns-ovnmeta\x2d9edf6fc5\x2d6400\x2d4804\x2d8e78\x2d3562cd73fd9b.mount: Deactivated successfully. Oct 12 14:46:45 np0005481648.novalocal lvm[96769]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 12 14:46:45 np0005481648.novalocal lvm[96769]: VG cinder-volumes finished Oct 12 14:46:45 np0005481648.novalocal sudo[96730]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:45 np0005481648.novalocal systemd[1]: session-c235.scope: Deactivated successfully. Oct 12 14:46:47 np0005481648.novalocal sudo[96776]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-db480bef-c4a4-45b2-a299-c8e358275f01 cinder-volumes/cinder-volumes-pool Oct 12 14:46:47 np0005481648.novalocal systemd[1]: Started Session c236 of User root. Oct 12 14:46:47 np0005481648.novalocal sudo[96776]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:47 np0005481648.novalocal lvm[96787]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 12 14:46:47 np0005481648.novalocal lvm[96787]: VG cinder-volumes finished Oct 12 14:46:47 np0005481648.novalocal sudo[96776]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:47 np0005481648.novalocal systemd[1]: session-c236.scope: Deactivated successfully. Oct 12 14:46:48 np0005481648.novalocal sudo[96788]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-db480bef-c4a4-45b2-a299-c8e358275f01 Oct 12 14:46:48 np0005481648.novalocal systemd[1]: Started Session c237 of User root. Oct 12 14:46:48 np0005481648.novalocal sudo[96788]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:48 np0005481648.novalocal sudo[96788]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:48 np0005481648.novalocal systemd[1]: session-c237.scope: Deactivated successfully. Oct 12 14:46:48 np0005481648.novalocal sudo[96792]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-db480bef-c4a4-45b2-a299-c8e358275f01 Oct 12 14:46:48 np0005481648.novalocal systemd[1]: Started Session c238 of User root. Oct 12 14:46:48 np0005481648.novalocal sudo[96792]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:48 np0005481648.novalocal sudo[96792]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:48 np0005481648.novalocal systemd[1]: session-c238.scope: Deactivated successfully. Oct 12 14:46:48 np0005481648.novalocal sudo[96796]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-db480bef-c4a4-45b2-a299-c8e358275f01 Oct 12 14:46:48 np0005481648.novalocal systemd[1]: Started Session c239 of User root. Oct 12 14:46:48 np0005481648.novalocal sudo[96796]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:49 np0005481648.novalocal lvm[96803]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 12 14:46:49 np0005481648.novalocal lvm[96803]: VG cinder-volumes finished Oct 12 14:46:49 np0005481648.novalocal sudo[96796]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:49 np0005481648.novalocal systemd[1]: session-c239.scope: Deactivated successfully. Oct 12 14:46:49 np0005481648.novalocal sudo[96804]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:46:49 np0005481648.novalocal systemd[1]: Started Session c240 of User root. Oct 12 14:46:49 np0005481648.novalocal sudo[96804]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:49 np0005481648.novalocal sudo[96804]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:49 np0005481648.novalocal systemd[1]: session-c240.scope: Deactivated successfully. Oct 12 14:46:49 np0005481648.novalocal sudo[96808]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:46:49 np0005481648.novalocal systemd[1]: Started Session c241 of User root. Oct 12 14:46:49 np0005481648.novalocal sudo[96808]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:50 np0005481648.novalocal sudo[96808]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:50 np0005481648.novalocal systemd[1]: session-c241.scope: Deactivated successfully. Oct 12 14:46:50 np0005481648.novalocal sudo[96812]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:46:50 np0005481648.novalocal systemd[1]: Started Session c242 of User root. Oct 12 14:46:50 np0005481648.novalocal sudo[96812]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:50 np0005481648.novalocal sudo[96815]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-6b886186-73b9-4936-b58e-2ffce0a11173 Oct 12 14:46:50 np0005481648.novalocal systemd[1]: Started Session c243 of User root. Oct 12 14:46:50 np0005481648.novalocal sudo[96815]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:50 np0005481648.novalocal sudo[96815]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:50 np0005481648.novalocal systemd[1]: session-c243.scope: Deactivated successfully. Oct 12 14:46:50 np0005481648.novalocal sudo[96812]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:50 np0005481648.novalocal systemd[1]: session-c242.scope: Deactivated successfully. Oct 12 14:46:50 np0005481648.novalocal sudo[96820]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-6b886186-73b9-4936-b58e-2ffce0a11173 Oct 12 14:46:50 np0005481648.novalocal systemd[1]: Started Session c244 of User root. Oct 12 14:46:50 np0005481648.novalocal sudo[96822]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:46:50 np0005481648.novalocal sudo[96820]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:50 np0005481648.novalocal systemd[1]: Started Session c245 of User root. Oct 12 14:46:50 np0005481648.novalocal sudo[96822]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:51 np0005481648.novalocal sudo[96822]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:51 np0005481648.novalocal sudo[96820]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:51 np0005481648.novalocal systemd[1]: session-c245.scope: Deactivated successfully. Oct 12 14:46:51 np0005481648.novalocal systemd[1]: session-c244.scope: Deactivated successfully. Oct 12 14:46:51 np0005481648.novalocal sudo[96828]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-6b886186-73b9-4936-b58e-2ffce0a11173 Oct 12 14:46:51 np0005481648.novalocal systemd[1]: Started Session c246 of User root. Oct 12 14:46:51 np0005481648.novalocal sudo[96828]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:51 np0005481648.novalocal lvm[96833]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 12 14:46:51 np0005481648.novalocal lvm[96833]: VG cinder-volumes finished Oct 12 14:46:51 np0005481648.novalocal sudo[96828]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:51 np0005481648.novalocal systemd[1]: session-c246.scope: Deactivated successfully. Oct 12 14:46:51 np0005481648.novalocal sudo[96834]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:46:51 np0005481648.novalocal systemd[1]: Started Session c247 of User root. Oct 12 14:46:51 np0005481648.novalocal sudo[96834]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:51 np0005481648.novalocal sudo[96834]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:51 np0005481648.novalocal systemd[1]: session-c247.scope: Deactivated successfully. Oct 12 14:46:52 np0005481648.novalocal sudo[96838]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:46:52 np0005481648.novalocal systemd[1]: Started Session c248 of User root. Oct 12 14:46:52 np0005481648.novalocal sudo[96838]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:52 np0005481648.novalocal sudo[96838]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:52 np0005481648.novalocal systemd[1]: session-c248.scope: Deactivated successfully. Oct 12 14:46:52 np0005481648.novalocal sudo[96842]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:46:52 np0005481648.novalocal systemd[1]: Started Session c249 of User root. Oct 12 14:46:52 np0005481648.novalocal sudo[96842]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:52 np0005481648.novalocal sudo[96842]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:52 np0005481648.novalocal systemd[1]: session-c249.scope: Deactivated successfully. Oct 12 14:46:52 np0005481648.novalocal sudo[96846]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:46:52 np0005481648.novalocal systemd[1]: Started Session c250 of User root. Oct 12 14:46:52 np0005481648.novalocal sudo[96846]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:53 np0005481648.novalocal sudo[96846]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:53 np0005481648.novalocal systemd[1]: session-c250.scope: Deactivated successfully. Oct 12 14:46:55 np0005481648.novalocal sudo[96852]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-f9d3826d-e369-43ab-ba6a-406b303937b3 cinder-volumes/cinder-volumes-pool Oct 12 14:46:55 np0005481648.novalocal systemd[1]: Started Session c251 of User root. Oct 12 14:46:55 np0005481648.novalocal sudo[96852]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:56 np0005481648.novalocal lvm[96865]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 12 14:46:56 np0005481648.novalocal lvm[96865]: VG cinder-volumes finished Oct 12 14:46:56 np0005481648.novalocal sudo[96852]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:56 np0005481648.novalocal systemd[1]: session-c251.scope: Deactivated successfully. Oct 12 14:46:57 np0005481648.novalocal sudo[96866]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-8d93c2c6-80e9-4948-abdf-175978bb4a8e cinder-volumes/cinder-volumes-pool Oct 12 14:46:57 np0005481648.novalocal systemd[1]: Started Session c252 of User root. Oct 12 14:46:57 np0005481648.novalocal sudo[96866]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:57 np0005481648.novalocal lvm[96876]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 12 14:46:57 np0005481648.novalocal lvm[96876]: VG cinder-volumes finished Oct 12 14:46:57 np0005481648.novalocal sudo[96866]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:57 np0005481648.novalocal systemd[1]: session-c252.scope: Deactivated successfully. Oct 12 14:46:58 np0005481648.novalocal sudo[96878]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-e0a7e3ee-abee-4f78-9bf7-bae43ee724f6 cinder-volumes/cinder-volumes-pool Oct 12 14:46:58 np0005481648.novalocal systemd[1]: Started Session c253 of User root. Oct 12 14:46:58 np0005481648.novalocal sudo[96878]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:46:59 np0005481648.novalocal lvm[96888]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 12 14:46:59 np0005481648.novalocal lvm[96888]: VG cinder-volumes finished Oct 12 14:46:59 np0005481648.novalocal sudo[96878]: pam_unix(sudo:session): session closed for user root Oct 12 14:46:59 np0005481648.novalocal systemd[1]: session-c253.scope: Deactivated successfully. Oct 12 14:46:59 np0005481648.novalocal sudo[96890]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-e0a7e3ee-abee-4f78-9bf7-bae43ee724f6 Oct 12 14:46:59 np0005481648.novalocal systemd[1]: Started Session c254 of User root. Oct 12 14:46:59 np0005481648.novalocal sudo[96890]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:47:00 np0005481648.novalocal sudo[96890]: pam_unix(sudo:session): session closed for user root Oct 12 14:47:00 np0005481648.novalocal systemd[1]: session-c254.scope: Deactivated successfully. Oct 12 14:47:00 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:47:00 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:47:00 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:47:00 np0005481648.novalocal sudo[96896]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-e0a7e3ee-abee-4f78-9bf7-bae43ee724f6 Oct 12 14:47:00 np0005481648.novalocal systemd[1]: Started Session c255 of User root. Oct 12 14:47:00 np0005481648.novalocal sudo[96896]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:47:00 np0005481648.novalocal sudo[96896]: pam_unix(sudo:session): session closed for user root Oct 12 14:47:00 np0005481648.novalocal systemd[1]: session-c255.scope: Deactivated successfully. Oct 12 14:47:00 np0005481648.novalocal sudo[96900]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-e0a7e3ee-abee-4f78-9bf7-bae43ee724f6 Oct 12 14:47:00 np0005481648.novalocal systemd[1]: Started Session c256 of User root. Oct 12 14:47:00 np0005481648.novalocal sudo[96900]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:47:01 np0005481648.novalocal lvm[96907]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 12 14:47:01 np0005481648.novalocal lvm[96907]: VG cinder-volumes finished Oct 12 14:47:01 np0005481648.novalocal sudo[96900]: pam_unix(sudo:session): session closed for user root Oct 12 14:47:01 np0005481648.novalocal systemd[1]: session-c256.scope: Deactivated successfully. Oct 12 14:47:01 np0005481648.novalocal sudo[96908]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:47:01 np0005481648.novalocal systemd[1]: Started Session c257 of User root. Oct 12 14:47:01 np0005481648.novalocal sudo[96908]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:47:01 np0005481648.novalocal sudo[96908]: pam_unix(sudo:session): session closed for user root Oct 12 14:47:01 np0005481648.novalocal systemd[1]: session-c257.scope: Deactivated successfully. Oct 12 14:47:01 np0005481648.novalocal sudo[96912]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:47:01 np0005481648.novalocal systemd[1]: Started Session c258 of User root. Oct 12 14:47:01 np0005481648.novalocal sudo[96912]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:47:02 np0005481648.novalocal sudo[96912]: pam_unix(sudo:session): session closed for user root Oct 12 14:47:02 np0005481648.novalocal systemd[1]: session-c258.scope: Deactivated successfully. Oct 12 14:47:02 np0005481648.novalocal sudo[96916]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:47:02 np0005481648.novalocal systemd[1]: Started Session c259 of User root. Oct 12 14:47:02 np0005481648.novalocal sudo[96916]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:47:02 np0005481648.novalocal sudo[96919]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-8d93c2c6-80e9-4948-abdf-175978bb4a8e Oct 12 14:47:02 np0005481648.novalocal systemd[1]: Started Session c260 of User root. Oct 12 14:47:02 np0005481648.novalocal sudo[96919]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:47:02 np0005481648.novalocal sudo[96916]: pam_unix(sudo:session): session closed for user root Oct 12 14:47:02 np0005481648.novalocal systemd[1]: session-c259.scope: Deactivated successfully. Oct 12 14:47:02 np0005481648.novalocal sudo[96924]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:47:02 np0005481648.novalocal systemd[1]: Started Session c261 of User root. Oct 12 14:47:02 np0005481648.novalocal sudo[96924]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:47:02 np0005481648.novalocal sudo[96919]: pam_unix(sudo:session): session closed for user root Oct 12 14:47:02 np0005481648.novalocal systemd[1]: session-c260.scope: Deactivated successfully. Oct 12 14:47:02 np0005481648.novalocal sudo[96927]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-8d93c2c6-80e9-4948-abdf-175978bb4a8e Oct 12 14:47:02 np0005481648.novalocal systemd[1]: Started Session c262 of User root. Oct 12 14:47:02 np0005481648.novalocal sudo[96927]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:47:02 np0005481648.novalocal sudo[96924]: pam_unix(sudo:session): session closed for user root Oct 12 14:47:02 np0005481648.novalocal systemd[1]: session-c261.scope: Deactivated successfully. Oct 12 14:47:02 np0005481648.novalocal sudo[96927]: pam_unix(sudo:session): session closed for user root Oct 12 14:47:02 np0005481648.novalocal systemd[1]: session-c262.scope: Deactivated successfully. Oct 12 14:47:03 np0005481648.novalocal sudo[96932]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-8d93c2c6-80e9-4948-abdf-175978bb4a8e Oct 12 14:47:03 np0005481648.novalocal systemd[1]: Started Session c263 of User root. Oct 12 14:47:03 np0005481648.novalocal sudo[96932]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:47:03 np0005481648.novalocal lvm[96937]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 12 14:47:03 np0005481648.novalocal lvm[96937]: VG cinder-volumes finished Oct 12 14:47:03 np0005481648.novalocal sudo[96932]: pam_unix(sudo:session): session closed for user root Oct 12 14:47:03 np0005481648.novalocal systemd[1]: session-c263.scope: Deactivated successfully. Oct 12 14:47:03 np0005481648.novalocal sudo[96938]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:47:03 np0005481648.novalocal systemd[1]: Started Session c264 of User root. Oct 12 14:47:03 np0005481648.novalocal sudo[96938]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:47:03 np0005481648.novalocal sudo[96938]: pam_unix(sudo:session): session closed for user root Oct 12 14:47:03 np0005481648.novalocal systemd[1]: session-c264.scope: Deactivated successfully. Oct 12 14:47:03 np0005481648.novalocal sudo[96942]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:47:04 np0005481648.novalocal systemd[1]: Started Session c265 of User root. Oct 12 14:47:04 np0005481648.novalocal sudo[96942]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:47:04 np0005481648.novalocal sudo[96942]: pam_unix(sudo:session): session closed for user root Oct 12 14:47:04 np0005481648.novalocal systemd[1]: session-c265.scope: Deactivated successfully. Oct 12 14:47:04 np0005481648.novalocal sudo[96946]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:47:04 np0005481648.novalocal systemd[1]: Started Session c266 of User root. Oct 12 14:47:04 np0005481648.novalocal sudo[96946]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:47:04 np0005481648.novalocal sudo[96948]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-f9d3826d-e369-43ab-ba6a-406b303937b3 Oct 12 14:47:04 np0005481648.novalocal systemd[1]: Started Session c267 of User root. Oct 12 14:47:04 np0005481648.novalocal sudo[96948]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:47:04 np0005481648.novalocal sudo[96946]: pam_unix(sudo:session): session closed for user root Oct 12 14:47:04 np0005481648.novalocal systemd[1]: session-c266.scope: Deactivated successfully. Oct 12 14:47:04 np0005481648.novalocal sudo[96948]: pam_unix(sudo:session): session closed for user root Oct 12 14:47:04 np0005481648.novalocal systemd[1]: session-c267.scope: Deactivated successfully. Oct 12 14:47:04 np0005481648.novalocal sudo[96954]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:47:04 np0005481648.novalocal systemd[1]: Started Session c268 of User root. Oct 12 14:47:04 np0005481648.novalocal sudo[96954]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:47:04 np0005481648.novalocal sudo[96956]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-f9d3826d-e369-43ab-ba6a-406b303937b3 Oct 12 14:47:05 np0005481648.novalocal systemd[1]: Started Session c269 of User root. Oct 12 14:47:05 np0005481648.novalocal sudo[96956]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:47:05 np0005481648.novalocal sudo[96954]: pam_unix(sudo:session): session closed for user root Oct 12 14:47:05 np0005481648.novalocal systemd[1]: session-c268.scope: Deactivated successfully. Oct 12 14:47:05 np0005481648.novalocal sudo[96956]: pam_unix(sudo:session): session closed for user root Oct 12 14:47:05 np0005481648.novalocal systemd[1]: session-c269.scope: Deactivated successfully. Oct 12 14:47:05 np0005481648.novalocal sudo[96964]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-f9d3826d-e369-43ab-ba6a-406b303937b3 Oct 12 14:47:05 np0005481648.novalocal systemd[1]: Started Session c270 of User root. Oct 12 14:47:05 np0005481648.novalocal sudo[96964]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:47:05 np0005481648.novalocal lvm[96971]: PV /dev/loop2 online, VG cinder-volumes is complete. Oct 12 14:47:05 np0005481648.novalocal lvm[96971]: VG cinder-volumes finished Oct 12 14:47:05 np0005481648.novalocal sudo[96964]: pam_unix(sudo:session): session closed for user root Oct 12 14:47:05 np0005481648.novalocal systemd[1]: session-c270.scope: Deactivated successfully. Oct 12 14:47:05 np0005481648.novalocal sudo[96972]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:47:05 np0005481648.novalocal systemd[1]: Started Session c271 of User root. Oct 12 14:47:05 np0005481648.novalocal sudo[96972]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:47:06 np0005481648.novalocal sudo[96972]: pam_unix(sudo:session): session closed for user root Oct 12 14:47:06 np0005481648.novalocal systemd[1]: session-c271.scope: Deactivated successfully. Oct 12 14:47:06 np0005481648.novalocal sudo[96976]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:47:06 np0005481648.novalocal systemd[1]: Started Session c272 of User root. Oct 12 14:47:06 np0005481648.novalocal sudo[96976]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:47:06 np0005481648.novalocal sudo[96976]: pam_unix(sudo:session): session closed for user root Oct 12 14:47:06 np0005481648.novalocal systemd[1]: session-c272.scope: Deactivated successfully. Oct 12 14:47:06 np0005481648.novalocal sudo[96980]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:47:06 np0005481648.novalocal systemd[1]: Started Session c273 of User root. Oct 12 14:47:06 np0005481648.novalocal sudo[96980]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:47:07 np0005481648.novalocal sudo[96980]: pam_unix(sudo:session): session closed for user root Oct 12 14:47:07 np0005481648.novalocal systemd[1]: session-c273.scope: Deactivated successfully. Oct 12 14:47:07 np0005481648.novalocal sudo[96984]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:47:07 np0005481648.novalocal systemd[1]: Started Session c274 of User root. Oct 12 14:47:07 np0005481648.novalocal sudo[96984]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:47:07 np0005481648.novalocal sudo[96984]: pam_unix(sudo:session): session closed for user root Oct 12 14:47:07 np0005481648.novalocal systemd[1]: session-c274.scope: Deactivated successfully. Oct 12 14:47:15 np0005481648.novalocal sudo[97033]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/ovn_vpn_agent.ini --privsep_context neutron.privileged.default --privsep_sock_path /tmp/tmpz68v2v48/privsep.sock Oct 12 14:47:15 np0005481648.novalocal systemd[1]: Started Session c275 of User root. Oct 12 14:47:15 np0005481648.novalocal sudo[97033]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 12 14:47:16 np0005481648.novalocal sudo[97033]: pam_unix(sudo:session): session closed for user root Oct 12 14:47:17 np0005481648.novalocal sudo[97049]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/ovn_vpn_agent.ini --privsep_context neutron.privileged.link_cmd --privsep_sock_path /tmp/tmph4412ytz/privsep.sock Oct 12 14:47:17 np0005481648.novalocal systemd[1]: Started Session c276 of User root. Oct 12 14:47:17 np0005481648.novalocal sudo[97049]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 12 14:47:18 np0005481648.novalocal sudo[97049]: pam_unix(sudo:session): session closed for user root Oct 12 14:47:19 np0005481648.novalocal sudo[97063]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap-daemon /etc/neutron/rootwrap.conf Oct 12 14:47:19 np0005481648.novalocal systemd[1]: Started Session c277 of User root. Oct 12 14:47:19 np0005481648.novalocal sudo[97063]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 12 14:47:19 np0005481648.novalocal kernel: vgf6caf160-1f5: entered promiscuous mode Oct 12 14:47:19 np0005481648.novalocal NetworkManager[857]: [1760294839.8169] manager: (vgf6caf160-1f5): 'openvswitch' plugin not available; creating generic device Oct 12 14:47:19 np0005481648.novalocal NetworkManager[857]: [1760294839.8182] manager: (vgf6caf160-1f5): new Generic device (/org/freedesktop/NetworkManager/Devices/33) Oct 12 14:47:19 np0005481648.novalocal systemd-udevd[97084]: Network interface NamePolicy= disabled on kernel command line. Oct 12 14:47:19 np0005481648.novalocal NetworkManager[857]: [1760294839.9662] manager: (tap3ab44eec-60): new Veth device (/org/freedesktop/NetworkManager/Devices/34) Oct 12 14:47:20 np0005481648.novalocal NetworkManager[857]: [1760294840.0233] device (tap3ab44eec-60): carrier: link connected Oct 12 14:47:20 np0005481648.novalocal kernel: tap3ab44eec-60: entered promiscuous mode Oct 12 14:47:20 np0005481648.novalocal sudo[97129]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-3ab44eec-6846-4861-aac6-0560c44ae22f env PROCESS_TAG=haproxy-3ab44eec-6846-4861-aac6-0560c44ae22f haproxy -f /var/lib/neutron/ovn-metadata-proxy/3ab44eec-6846-4861-aac6-0560c44ae22f.conf Oct 12 14:47:20 np0005481648.novalocal systemd[1]: Started Session c278 of User root. Oct 12 14:47:20 np0005481648.novalocal sudo[97129]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 12 14:47:20 np0005481648.novalocal sudo[97129]: pam_unix(sudo:session): session closed for user root Oct 12 14:47:20 np0005481648.novalocal kernel: vrc49e4f13-bbe: entered promiscuous mode Oct 12 14:47:20 np0005481648.novalocal NetworkManager[857]: [1760294840.6927] manager: (vrc49e4f13-bbe): 'openvswitch' plugin not available; creating generic device Oct 12 14:47:20 np0005481648.novalocal NetworkManager[857]: [1760294840.6938] manager: (vrc49e4f13-bbe): new Generic device (/org/freedesktop/NetworkManager/Devices/35) Oct 12 14:47:20 np0005481648.novalocal systemd-udevd[97115]: Network interface NamePolicy= disabled on kernel command line. Oct 12 14:47:20 np0005481648.novalocal sshd-session[97135]: Invalid user sol from 209.38.110.19 port 49826 Oct 12 14:47:20 np0005481648.novalocal sshd-session[97135]: Connection closed by invalid user sol 209.38.110.19 port 49826 [preauth] Oct 12 14:47:22 np0005481648.novalocal kernel: IPv4 over IPsec tunneling driver Oct 12 14:47:22 np0005481648.novalocal NetworkManager[857]: [1760294842.8062] manager: (ip_vti0): new IPTunnel device (/org/freedesktop/NetworkManager/Devices/36) Oct 12 14:47:22 np0005481648.novalocal kernel: IPsec XFRM device driver Oct 12 14:47:35 np0005481648.novalocal sudo[97505]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:47:35 np0005481648.novalocal systemd[1]: Started Session c279 of User root. Oct 12 14:47:35 np0005481648.novalocal sudo[97505]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:47:35 np0005481648.novalocal sudo[97505]: pam_unix(sudo:session): session closed for user root Oct 12 14:47:35 np0005481648.novalocal systemd[1]: session-c279.scope: Deactivated successfully. Oct 12 14:47:35 np0005481648.novalocal sudo[97509]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:47:35 np0005481648.novalocal systemd[1]: Started Session c280 of User root. Oct 12 14:47:35 np0005481648.novalocal sudo[97509]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:47:36 np0005481648.novalocal sudo[97509]: pam_unix(sudo:session): session closed for user root Oct 12 14:47:36 np0005481648.novalocal systemd[1]: session-c280.scope: Deactivated successfully. Oct 12 14:47:36 np0005481648.novalocal sudo[97515]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:47:36 np0005481648.novalocal systemd[1]: Started Session c281 of User root. Oct 12 14:47:36 np0005481648.novalocal sudo[97515]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:47:36 np0005481648.novalocal sudo[97515]: pam_unix(sudo:session): session closed for user root Oct 12 14:47:36 np0005481648.novalocal systemd[1]: session-c281.scope: Deactivated successfully. Oct 12 14:47:36 np0005481648.novalocal sudo[97521]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:47:36 np0005481648.novalocal systemd[1]: Started Session c282 of User root. Oct 12 14:47:36 np0005481648.novalocal sudo[97521]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:47:37 np0005481648.novalocal sudo[97521]: pam_unix(sudo:session): session closed for user root Oct 12 14:47:37 np0005481648.novalocal systemd[1]: session-c282.scope: Deactivated successfully. Oct 12 14:47:42 np0005481648.novalocal kernel: tap201f17b0-ff: entered promiscuous mode Oct 12 14:47:42 np0005481648.novalocal NetworkManager[857]: [1760294862.6594] manager: (tap201f17b0-ff): new Tun device (/org/freedesktop/NetworkManager/Devices/37) Oct 12 14:47:42 np0005481648.novalocal virtqemud[90651]: Domain id=11 name='instance-0000000a' uuid=21997c8a-fb64-4919-bd3e-2129240622de is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Oct 12 14:47:42 np0005481648.novalocal virtqemud[90651]: Domain id=11 name='instance-0000000a' uuid=21997c8a-fb64-4919-bd3e-2129240622de is tainted: deprecated-config (CPU model 'qemu64') Oct 12 14:47:42 np0005481648.novalocal systemd-machined[87546]: New machine qemu-11-instance-0000000a. Oct 12 14:47:42 np0005481648.novalocal systemd[1]: Started Virtual Machine qemu-11-instance-0000000a. Oct 12 14:47:42 np0005481648.novalocal systemd-udevd[97608]: Network interface NamePolicy= disabled on kernel command line. Oct 12 14:47:42 np0005481648.novalocal NetworkManager[857]: [1760294862.7518] device (tap201f17b0-ff): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 12 14:47:42 np0005481648.novalocal NetworkManager[857]: [1760294862.7525] device (tap201f17b0-ff): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 12 14:47:42 np0005481648.novalocal NetworkManager[857]: [1760294862.7801] manager: (tapf2192b1d-50): new Veth device (/org/freedesktop/NetworkManager/Devices/38) Oct 12 14:47:42 np0005481648.novalocal systemd-udevd[97612]: Network interface NamePolicy= disabled on kernel command line. Oct 12 14:47:42 np0005481648.novalocal NetworkManager[857]: [1760294862.8469] device (tapf2192b1d-50): carrier: link connected Oct 12 14:47:42 np0005481648.novalocal kernel: tapf2192b1d-50: entered promiscuous mode Oct 12 14:47:43 np0005481648.novalocal sudo[97651]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-f2192b1d-5b63-4787-8b81-74c957462dcd env PROCESS_TAG=haproxy-f2192b1d-5b63-4787-8b81-74c957462dcd haproxy -f /var/lib/neutron/ovn-metadata-proxy/f2192b1d-5b63-4787-8b81-74c957462dcd.conf Oct 12 14:47:43 np0005481648.novalocal systemd[1]: Started Session c283 of User root. Oct 12 14:47:43 np0005481648.novalocal sudo[97651]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Oct 12 14:47:43 np0005481648.novalocal sudo[97651]: pam_unix(sudo:session): session closed for user root Oct 12 14:47:44 np0005481648.novalocal systemd[1]: session-c278.scope: Deactivated successfully. Oct 12 14:47:44 np0005481648.novalocal kernel: tap3ab44eec-60: left promiscuous mode Oct 12 14:47:49 np0005481648.novalocal kernel: vrc49e4f13-bbe: left promiscuous mode Oct 12 14:47:49 np0005481648.novalocal kernel: vgf6caf160-1f5: left promiscuous mode Oct 12 14:47:49 np0005481648.novalocal systemd[1]: run-netns-qvpn\x2d5a3d1bc2\x2d1b68\x2d419b\x2d8366\x2d043e4192c8d8.mount: Deactivated successfully. Oct 12 14:48:07 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:48:07 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:48:07 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:48:11 np0005481648.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 12 14:48:12 np0005481648.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 12 14:48:13 np0005481648.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@11.service. Oct 12 14:48:14 np0005481648.novalocal setroubleshoot[97806]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. For complete SELinux messages run: sealert -l 056ba36c-49bc-4888-867e-23d45bc19bbb Oct 12 14:48:14 np0005481648.novalocal setroubleshoot[97806]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the status.sock sock_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 12 14:48:16 np0005481648.novalocal setroubleshoot[97806]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. For complete SELinux messages run: sealert -l 056ba36c-49bc-4888-867e-23d45bc19bbb Oct 12 14:48:16 np0005481648.novalocal setroubleshoot[97806]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the status.sock sock_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Oct 12 14:48:20 np0005481648.novalocal haproxy-metadata-proxy-f2192b1d-5b63-4787-8b81-74c957462dcd[97656]: 10.100.0.13:55988 [12/Oct/2025:14:48:20.252] listener listener/metadata 0/0/0/115/115 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Oct 12 14:48:20 np0005481648.novalocal haproxy-metadata-proxy-f2192b1d-5b63-4787-8b81-74c957462dcd[97656]: 10.100.0.13:55992 [12/Oct/2025:14:48:20.454] listener listener/metadata 0/0/0/16/16 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Oct 12 14:48:20 np0005481648.novalocal haproxy-metadata-proxy-f2192b1d-5b63-4787-8b81-74c957462dcd[97656]: 10.100.0.13:55994 [12/Oct/2025:14:48:20.520] listener listener/metadata 0/0/0/11/11 200 292 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Oct 12 14:48:20 np0005481648.novalocal haproxy-metadata-proxy-f2192b1d-5b63-4787-8b81-74c957462dcd[97656]: 10.100.0.13:56010 [12/Oct/2025:14:48:20.599] listener listener/metadata 0/0/0/11/11 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Oct 12 14:48:20 np0005481648.novalocal haproxy-metadata-proxy-f2192b1d-5b63-4787-8b81-74c957462dcd[97656]: 10.100.0.13:56014 [12/Oct/2025:14:48:20.661] listener listener/metadata 0/0/0/9/9 200 87 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Oct 12 14:48:20 np0005481648.novalocal haproxy-metadata-proxy-f2192b1d-5b63-4787-8b81-74c957462dcd[97656]: 10.100.0.13:56020 [12/Oct/2025:14:48:20.713] listener listener/metadata 0/0/0/8/8 200 93 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Oct 12 14:48:20 np0005481648.novalocal haproxy-metadata-proxy-f2192b1d-5b63-4787-8b81-74c957462dcd[97656]: 10.100.0.13:56034 [12/Oct/2025:14:48:20.765] listener listener/metadata 0/0/0/9/9 200 98 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Oct 12 14:48:20 np0005481648.novalocal haproxy-metadata-proxy-f2192b1d-5b63-4787-8b81-74c957462dcd[97656]: 10.100.0.13:56048 [12/Oct/2025:14:48:20.816] listener listener/metadata 0/0/0/10/10 200 99 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Oct 12 14:48:20 np0005481648.novalocal haproxy-metadata-proxy-f2192b1d-5b63-4787-8b81-74c957462dcd[97656]: 10.100.0.13:56062 [12/Oct/2025:14:48:20.872] listener listener/metadata 0/0/0/11/11 200 141 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Oct 12 14:48:20 np0005481648.novalocal haproxy-metadata-proxy-f2192b1d-5b63-4787-8b81-74c957462dcd[97656]: 10.100.0.13:56066 [12/Oct/2025:14:48:20.939] listener listener/metadata 0/0/0/9/9 200 141 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Oct 12 14:48:20 np0005481648.novalocal haproxy-metadata-proxy-f2192b1d-5b63-4787-8b81-74c957462dcd[97656]: 10.100.0.13:56082 [12/Oct/2025:14:48:20.988] listener listener/metadata 0/0/0/9/9 404 248 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Oct 12 14:48:21 np0005481648.novalocal haproxy-metadata-proxy-f2192b1d-5b63-4787-8b81-74c957462dcd[97656]: 10.100.0.13:56096 [12/Oct/2025:14:48:21.043] listener listener/metadata 0/0/0/10/10 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Oct 12 14:48:21 np0005481648.novalocal haproxy-metadata-proxy-f2192b1d-5b63-4787-8b81-74c957462dcd[97656]: 10.100.0.13:56100 [12/Oct/2025:14:48:21.080] listener listener/metadata 0/0/0/8/8 200 89 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Oct 12 14:48:21 np0005481648.novalocal haproxy-metadata-proxy-f2192b1d-5b63-4787-8b81-74c957462dcd[97656]: 10.100.0.13:56108 [12/Oct/2025:14:48:21.117] listener listener/metadata 0/0/0/8/8 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Oct 12 14:48:21 np0005481648.novalocal haproxy-metadata-proxy-f2192b1d-5b63-4787-8b81-74c957462dcd[97656]: 10.100.0.13:56116 [12/Oct/2025:14:48:21.164] listener listener/metadata 0/0/0/13/13 200 141 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Oct 12 14:48:21 np0005481648.novalocal haproxy-metadata-proxy-f2192b1d-5b63-4787-8b81-74c957462dcd[97656]: 10.100.0.13:56118 [12/Oct/2025:14:48:21.214] listener listener/metadata 0/0/0/13/13 200 90 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Oct 12 14:48:26 np0005481648.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@11.service: Deactivated successfully. Oct 12 14:48:26 np0005481648.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@11.service: Consumed 1.280s CPU time. Oct 12 14:48:26 np0005481648.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 12 14:48:26 np0005481648.novalocal systemd[1]: setroubleshootd.service: Consumed 1.352s CPU time. Oct 12 14:48:35 np0005481648.novalocal sudo[97883]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:48:35 np0005481648.novalocal systemd[1]: Started Session c284 of User root. Oct 12 14:48:35 np0005481648.novalocal sudo[97883]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:48:35 np0005481648.novalocal sudo[97883]: pam_unix(sudo:session): session closed for user root Oct 12 14:48:35 np0005481648.novalocal systemd[1]: session-c284.scope: Deactivated successfully. Oct 12 14:48:35 np0005481648.novalocal sudo[97889]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:48:35 np0005481648.novalocal systemd[1]: Started Session c285 of User root. Oct 12 14:48:35 np0005481648.novalocal sudo[97889]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:48:36 np0005481648.novalocal sudo[97889]: pam_unix(sudo:session): session closed for user root Oct 12 14:48:36 np0005481648.novalocal systemd[1]: session-c285.scope: Deactivated successfully. Oct 12 14:48:36 np0005481648.novalocal sudo[97893]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:48:36 np0005481648.novalocal systemd[1]: Started Session c286 of User root. Oct 12 14:48:36 np0005481648.novalocal sudo[97893]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:48:36 np0005481648.novalocal sudo[97893]: pam_unix(sudo:session): session closed for user root Oct 12 14:48:36 np0005481648.novalocal systemd[1]: session-c286.scope: Deactivated successfully. Oct 12 14:48:36 np0005481648.novalocal sudo[97897]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:48:36 np0005481648.novalocal systemd[1]: Started Session c287 of User root. Oct 12 14:48:36 np0005481648.novalocal sudo[97897]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:48:36 np0005481648.novalocal sudo[97897]: pam_unix(sudo:session): session closed for user root Oct 12 14:48:36 np0005481648.novalocal systemd[1]: session-c287.scope: Deactivated successfully. Oct 12 14:48:43 np0005481648.novalocal NetworkManager[857]: [1760294923.3449] manager: (tap2edda1fd-4e): new Tun device (/org/freedesktop/NetworkManager/Devices/39) Oct 12 14:48:43 np0005481648.novalocal kernel: tap2edda1fd-4e: entered promiscuous mode Oct 12 14:48:43 np0005481648.novalocal virtqemud[90651]: Domain id=12 name='instance-0000000b' uuid=2606c5d9-7565-4885-8e63-ebd804371442 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Oct 12 14:48:43 np0005481648.novalocal virtqemud[90651]: Domain id=12 name='instance-0000000b' uuid=2606c5d9-7565-4885-8e63-ebd804371442 is tainted: deprecated-config (CPU model 'qemu64') Oct 12 14:48:43 np0005481648.novalocal systemd-udevd[97952]: Network interface NamePolicy= disabled on kernel command line. Oct 12 14:48:43 np0005481648.novalocal NetworkManager[857]: [1760294923.4196] device (tap2edda1fd-4e): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Oct 12 14:48:43 np0005481648.novalocal NetworkManager[857]: [1760294923.4201] device (tap2edda1fd-4e): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Oct 12 14:48:43 np0005481648.novalocal systemd-machined[87546]: New machine qemu-12-instance-0000000b. Oct 12 14:48:43 np0005481648.novalocal systemd[1]: Started Virtual Machine qemu-12-instance-0000000b. Oct 12 14:49:05 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:49:05 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:49:05 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:49:05 np0005481648.novalocal haproxy-metadata-proxy-f2192b1d-5b63-4787-8b81-74c957462dcd[97656]: 10.100.0.9:42110 [12/Oct/2025:14:49:05.561] listener listener/metadata 0/0/0/129/129 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Oct 12 14:49:05 np0005481648.novalocal haproxy-metadata-proxy-f2192b1d-5b63-4787-8b81-74c957462dcd[97656]: 10.100.0.9:42112 [12/Oct/2025:14:49:05.761] listener listener/metadata 0/0/0/10/10 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Oct 12 14:49:05 np0005481648.novalocal haproxy-metadata-proxy-f2192b1d-5b63-4787-8b81-74c957462dcd[97656]: 10.100.0.9:42122 [12/Oct/2025:14:49:05.802] listener listener/metadata 0/0/0/11/11 200 292 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Oct 12 14:49:05 np0005481648.novalocal haproxy-metadata-proxy-f2192b1d-5b63-4787-8b81-74c957462dcd[97656]: 10.100.0.9:42130 [12/Oct/2025:14:49:05.853] listener listener/metadata 0/0/0/11/11 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Oct 12 14:49:05 np0005481648.novalocal haproxy-metadata-proxy-f2192b1d-5b63-4787-8b81-74c957462dcd[97656]: 10.100.0.9:42142 [12/Oct/2025:14:49:05.906] listener listener/metadata 0/0/0/9/9 200 87 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Oct 12 14:49:05 np0005481648.novalocal haproxy-metadata-proxy-f2192b1d-5b63-4787-8b81-74c957462dcd[97656]: 10.100.0.9:42146 [12/Oct/2025:14:49:05.954] listener listener/metadata 0/0/0/10/10 200 93 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Oct 12 14:49:06 np0005481648.novalocal haproxy-metadata-proxy-f2192b1d-5b63-4787-8b81-74c957462dcd[97656]: 10.100.0.9:42150 [12/Oct/2025:14:49:06.012] listener listener/metadata 0/0/0/11/11 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Oct 12 14:49:06 np0005481648.novalocal haproxy-metadata-proxy-f2192b1d-5b63-4787-8b81-74c957462dcd[97656]: 10.100.0.9:42152 [12/Oct/2025:14:49:06.070] listener listener/metadata 0/0/0/15/15 200 99 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Oct 12 14:49:06 np0005481648.novalocal haproxy-metadata-proxy-f2192b1d-5b63-4787-8b81-74c957462dcd[97656]: 10.100.0.9:42168 [12/Oct/2025:14:49:06.137] listener listener/metadata 0/0/0/13/13 200 142 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Oct 12 14:49:06 np0005481648.novalocal haproxy-metadata-proxy-f2192b1d-5b63-4787-8b81-74c957462dcd[97656]: 10.100.0.9:42176 [12/Oct/2025:14:49:06.231] listener listener/metadata 0/0/0/17/17 200 142 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Oct 12 14:49:06 np0005481648.novalocal haproxy-metadata-proxy-f2192b1d-5b63-4787-8b81-74c957462dcd[97656]: 10.100.0.9:42184 [12/Oct/2025:14:49:06.325] listener listener/metadata 0/0/0/9/9 404 248 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Oct 12 14:49:06 np0005481648.novalocal haproxy-metadata-proxy-f2192b1d-5b63-4787-8b81-74c957462dcd[97656]: 10.100.0.9:42194 [12/Oct/2025:14:49:06.378] listener listener/metadata 0/0/0/12/12 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Oct 12 14:49:06 np0005481648.novalocal haproxy-metadata-proxy-f2192b1d-5b63-4787-8b81-74c957462dcd[97656]: 10.100.0.9:42202 [12/Oct/2025:14:49:06.419] listener listener/metadata 0/0/0/16/16 200 89 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Oct 12 14:49:06 np0005481648.novalocal haproxy-metadata-proxy-f2192b1d-5b63-4787-8b81-74c957462dcd[97656]: 10.100.0.9:42216 [12/Oct/2025:14:49:06.463] listener listener/metadata 0/0/0/10/10 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Oct 12 14:49:06 np0005481648.novalocal haproxy-metadata-proxy-f2192b1d-5b63-4787-8b81-74c957462dcd[97656]: 10.100.0.9:42226 [12/Oct/2025:14:49:06.513] listener listener/metadata 0/0/0/11/11 200 142 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Oct 12 14:49:06 np0005481648.novalocal haproxy-metadata-proxy-f2192b1d-5b63-4787-8b81-74c957462dcd[97656]: 10.100.0.9:42232 [12/Oct/2025:14:49:06.561] listener listener/metadata 0/0/0/11/11 200 90 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Oct 12 14:49:12 np0005481648.novalocal kernel: tap2edda1fd-4e (unregistering): left promiscuous mode Oct 12 14:49:12 np0005481648.novalocal NetworkManager[857]: [1760294952.8235] device (tap2edda1fd-4e): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Oct 12 14:49:12 np0005481648.novalocal systemd[1]: machine-qemu\x2d12\x2dinstance\x2d0000000b.scope: Deactivated successfully. Oct 12 14:49:12 np0005481648.novalocal systemd[1]: machine-qemu\x2d12\x2dinstance\x2d0000000b.scope: Consumed 23.798s CPU time. Oct 12 14:49:12 np0005481648.novalocal systemd-machined[87546]: Machine qemu-12-instance-0000000b terminated. Oct 12 14:49:13 np0005481648.novalocal kernel: tap2edda1fd-4e: entered promiscuous mode Oct 12 14:49:13 np0005481648.novalocal systemd-udevd[98090]: Network interface NamePolicy= disabled on kernel command line. Oct 12 14:49:13 np0005481648.novalocal kernel: tap2edda1fd-4e (unregistering): left promiscuous mode Oct 12 14:49:13 np0005481648.novalocal NetworkManager[857]: [1760294953.0344] manager: (tap2edda1fd-4e): new Tun device (/org/freedesktop/NetworkManager/Devices/40) Oct 12 14:49:23 np0005481648.novalocal kernel: tap201f17b0-ff (unregistering): left promiscuous mode Oct 12 14:49:23 np0005481648.novalocal NetworkManager[857]: [1760294963.7100] device (tap201f17b0-ff): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Oct 12 14:49:23 np0005481648.novalocal systemd[1]: machine-qemu\x2d11\x2dinstance\x2d0000000a.scope: Deactivated successfully. Oct 12 14:49:23 np0005481648.novalocal systemd[1]: machine-qemu\x2d11\x2dinstance\x2d0000000a.scope: Consumed 25.863s CPU time. Oct 12 14:49:23 np0005481648.novalocal systemd-machined[87546]: Machine qemu-11-instance-0000000a terminated. Oct 12 14:49:23 np0005481648.novalocal kernel: tapf2192b1d-50: left promiscuous mode Oct 12 14:49:23 np0005481648.novalocal systemd[1]: session-c283.scope: Deactivated successfully. Oct 12 14:49:35 np0005481648.novalocal sudo[98185]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:49:35 np0005481648.novalocal systemd[1]: Started Session c288 of User root. Oct 12 14:49:35 np0005481648.novalocal sudo[98185]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:49:35 np0005481648.novalocal sudo[98185]: pam_unix(sudo:session): session closed for user root Oct 12 14:49:35 np0005481648.novalocal systemd[1]: session-c288.scope: Deactivated successfully. Oct 12 14:49:35 np0005481648.novalocal sudo[98193]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:49:35 np0005481648.novalocal systemd[1]: Started Session c289 of User root. Oct 12 14:49:35 np0005481648.novalocal sudo[98193]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:49:36 np0005481648.novalocal sudo[98193]: pam_unix(sudo:session): session closed for user root Oct 12 14:49:36 np0005481648.novalocal systemd[1]: session-c289.scope: Deactivated successfully. Oct 12 14:49:36 np0005481648.novalocal sudo[98198]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:49:36 np0005481648.novalocal systemd[1]: Started Session c290 of User root. Oct 12 14:49:36 np0005481648.novalocal sudo[98198]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:49:36 np0005481648.novalocal sudo[98198]: pam_unix(sudo:session): session closed for user root Oct 12 14:49:36 np0005481648.novalocal systemd[1]: session-c290.scope: Deactivated successfully. Oct 12 14:49:36 np0005481648.novalocal sudo[98202]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:49:36 np0005481648.novalocal systemd[1]: Started Session c291 of User root. Oct 12 14:49:36 np0005481648.novalocal sudo[98202]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:49:37 np0005481648.novalocal sudo[98202]: pam_unix(sudo:session): session closed for user root Oct 12 14:49:37 np0005481648.novalocal systemd[1]: session-c291.scope: Deactivated successfully. Oct 12 14:50:05 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:50:05 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:50:05 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:50:20 np0005481648.novalocal lvm[98306]: PV /dev/loop3 online, VG lvm-shares is complete. Oct 12 14:50:20 np0005481648.novalocal lvm[98306]: VG lvm-shares finished Oct 12 14:50:22 np0005481648.novalocal kernel: EXT4-fs (dm-6): mounted filesystem 933f8f0a-39cc-45cc-ae8e-490201859237 r/w with ordered data mode. Quota mode: none. Oct 12 14:50:26 np0005481648.novalocal systemd[1]: var-lib-manila-mnt-share\x2d880d9cfb\x2de780\x2d4eb5\x2db62f\x2dc2bbb9e1876b.mount: Deactivated successfully. Oct 12 14:50:26 np0005481648.novalocal kernel: EXT4-fs (dm-6): unmounting filesystem 933f8f0a-39cc-45cc-ae8e-490201859237. Oct 12 14:50:26 np0005481648.novalocal lvm[98329]: PV /dev/loop3 online, VG lvm-shares is complete. Oct 12 14:50:26 np0005481648.novalocal lvm[98329]: VG lvm-shares finished Oct 12 14:50:35 np0005481648.novalocal sudo[98336]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:50:35 np0005481648.novalocal systemd[1]: Started Session c292 of User root. Oct 12 14:50:35 np0005481648.novalocal sudo[98336]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:50:35 np0005481648.novalocal sudo[98336]: pam_unix(sudo:session): session closed for user root Oct 12 14:50:35 np0005481648.novalocal systemd[1]: session-c292.scope: Deactivated successfully. Oct 12 14:50:35 np0005481648.novalocal sudo[98342]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:50:35 np0005481648.novalocal systemd[1]: Started Session c293 of User root. Oct 12 14:50:35 np0005481648.novalocal sudo[98342]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:50:36 np0005481648.novalocal sudo[98342]: pam_unix(sudo:session): session closed for user root Oct 12 14:50:36 np0005481648.novalocal systemd[1]: session-c293.scope: Deactivated successfully. Oct 12 14:50:36 np0005481648.novalocal sudo[98346]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:50:36 np0005481648.novalocal systemd[1]: Started Session c294 of User root. Oct 12 14:50:36 np0005481648.novalocal sudo[98346]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:50:36 np0005481648.novalocal sudo[98346]: pam_unix(sudo:session): session closed for user root Oct 12 14:50:36 np0005481648.novalocal systemd[1]: session-c294.scope: Deactivated successfully. Oct 12 14:50:36 np0005481648.novalocal sudo[98350]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:50:36 np0005481648.novalocal systemd[1]: Started Session c295 of User root. Oct 12 14:50:36 np0005481648.novalocal sudo[98350]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:50:36 np0005481648.novalocal sudo[98350]: pam_unix(sudo:session): session closed for user root Oct 12 14:50:36 np0005481648.novalocal systemd[1]: session-c295.scope: Deactivated successfully. Oct 12 14:51:03 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:51:03 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:51:03 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:51:35 np0005481648.novalocal sudo[98440]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:51:35 np0005481648.novalocal systemd[1]: Started Session c296 of User root. Oct 12 14:51:35 np0005481648.novalocal sudo[98440]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:51:35 np0005481648.novalocal sudo[98440]: pam_unix(sudo:session): session closed for user root Oct 12 14:51:35 np0005481648.novalocal systemd[1]: session-c296.scope: Deactivated successfully. Oct 12 14:51:35 np0005481648.novalocal sudo[98446]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:51:35 np0005481648.novalocal systemd[1]: Started Session c297 of User root. Oct 12 14:51:35 np0005481648.novalocal sudo[98446]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:51:36 np0005481648.novalocal sudo[98446]: pam_unix(sudo:session): session closed for user root Oct 12 14:51:36 np0005481648.novalocal systemd[1]: session-c297.scope: Deactivated successfully. Oct 12 14:51:36 np0005481648.novalocal sudo[98450]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:51:36 np0005481648.novalocal systemd[1]: Started Session c298 of User root. Oct 12 14:51:36 np0005481648.novalocal sudo[98450]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:51:36 np0005481648.novalocal sudo[98450]: pam_unix(sudo:session): session closed for user root Oct 12 14:51:36 np0005481648.novalocal systemd[1]: session-c298.scope: Deactivated successfully. Oct 12 14:51:36 np0005481648.novalocal sudo[98454]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:51:36 np0005481648.novalocal systemd[1]: Started Session c299 of User root. Oct 12 14:51:36 np0005481648.novalocal sudo[98454]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:51:36 np0005481648.novalocal sudo[98454]: pam_unix(sudo:session): session closed for user root Oct 12 14:51:36 np0005481648.novalocal systemd[1]: session-c299.scope: Deactivated successfully. Oct 12 14:52:03 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:52:03 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:52:03 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:52:35 np0005481648.novalocal sudo[98542]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:52:35 np0005481648.novalocal systemd[1]: Started Session c300 of User root. Oct 12 14:52:35 np0005481648.novalocal sudo[98542]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:52:35 np0005481648.novalocal sudo[98542]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:35 np0005481648.novalocal systemd[1]: session-c300.scope: Deactivated successfully. Oct 12 14:52:35 np0005481648.novalocal sudo[98548]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:52:35 np0005481648.novalocal systemd[1]: Started Session c301 of User root. Oct 12 14:52:35 np0005481648.novalocal sudo[98548]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:52:36 np0005481648.novalocal sudo[98548]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:36 np0005481648.novalocal systemd[1]: session-c301.scope: Deactivated successfully. Oct 12 14:52:36 np0005481648.novalocal sudo[98552]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:52:36 np0005481648.novalocal systemd[1]: Started Session c302 of User root. Oct 12 14:52:36 np0005481648.novalocal sudo[98552]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:52:36 np0005481648.novalocal sudo[98552]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:36 np0005481648.novalocal systemd[1]: session-c302.scope: Deactivated successfully. Oct 12 14:52:36 np0005481648.novalocal sudo[98556]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:52:36 np0005481648.novalocal systemd[1]: Started Session c303 of User root. Oct 12 14:52:36 np0005481648.novalocal sudo[98556]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:52:37 np0005481648.novalocal sudo[98556]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:37 np0005481648.novalocal systemd[1]: session-c303.scope: Deactivated successfully. Oct 12 14:52:41 np0005481648.novalocal sudo[50775]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:42 np0005481648.novalocal sudo[99264]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ldbdvmrbhfjmrqjrpfybizeuesettslt ; WORKSPACE=/var/log/weirdo-project /usr/bin/python3' Oct 12 14:52:42 np0005481648.novalocal sudo[99264]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:52:43 np0005481648.novalocal python3[99266]: ansible-command Invoked with chdir=/tmp/puppet-openstack creates=/var/log/weirdo-project/logs _raw_params=./copy_logs.sh warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None executable=None removes=None stdin=None Oct 12 14:52:43 np0005481648.novalocal sudo[99389]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/ceph /var/log/weirdo-project/logs/etc/ Oct 12 14:52:43 np0005481648.novalocal sudo[99389]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:43 np0005481648.novalocal sudo[99389]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:43 np0005481648.novalocal sudo[99392]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/cinder /var/log/weirdo-project/logs/etc/ Oct 12 14:52:43 np0005481648.novalocal sudo[99392]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:43 np0005481648.novalocal sudo[99392]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:43 np0005481648.novalocal sudo[99395]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/cinder /var/log/weirdo-project/logs Oct 12 14:52:43 np0005481648.novalocal sudo[99395]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:43 np0005481648.novalocal sudo[99395]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:43 np0005481648.novalocal sudo[99398]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/glance /var/log/weirdo-project/logs/etc/ Oct 12 14:52:43 np0005481648.novalocal sudo[99398]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:43 np0005481648.novalocal sudo[99398]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:43 np0005481648.novalocal sudo[99401]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/glance /var/log/weirdo-project/logs Oct 12 14:52:43 np0005481648.novalocal sudo[99401]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:43 np0005481648.novalocal sudo[99401]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:43 np0005481648.novalocal sudo[99404]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/horizon /var/log/weirdo-project/logs Oct 12 14:52:43 np0005481648.novalocal sudo[99404]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:43 np0005481648.novalocal sudo[99404]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:43 np0005481648.novalocal sudo[99407]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/keystone /var/log/weirdo-project/logs/etc/ Oct 12 14:52:43 np0005481648.novalocal sudo[99407]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:43 np0005481648.novalocal sudo[99407]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:43 np0005481648.novalocal sudo[99410]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/keystone /var/log/weirdo-project/logs Oct 12 14:52:43 np0005481648.novalocal sudo[99410]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:43 np0005481648.novalocal sudo[99410]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:43 np0005481648.novalocal sudo[99413]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/manila /var/log/weirdo-project/logs/etc/ Oct 12 14:52:43 np0005481648.novalocal sudo[99413]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:43 np0005481648.novalocal sudo[99413]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:43 np0005481648.novalocal sudo[99416]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/manila /var/log/weirdo-project/logs Oct 12 14:52:44 np0005481648.novalocal sudo[99416]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:44 np0005481648.novalocal sudo[99416]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:44 np0005481648.novalocal sudo[99419]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/neutron /var/log/weirdo-project/logs/etc/ Oct 12 14:52:44 np0005481648.novalocal sudo[99419]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:44 np0005481648.novalocal sudo[99419]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:44 np0005481648.novalocal sudo[99422]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/neutron /var/log/weirdo-project/logs Oct 12 14:52:44 np0005481648.novalocal sudo[99422]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:44 np0005481648.novalocal sudo[99422]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:44 np0005481648.novalocal sudo[99425]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/nova /var/log/weirdo-project/logs/etc/ Oct 12 14:52:44 np0005481648.novalocal sudo[99425]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:44 np0005481648.novalocal sudo[99425]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:44 np0005481648.novalocal sudo[99428]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/nova /var/log/weirdo-project/logs Oct 12 14:52:44 np0005481648.novalocal sudo[99428]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:44 np0005481648.novalocal sudo[99428]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:44 np0005481648.novalocal sudo[99431]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/octavia /var/log/weirdo-project/logs/etc/ Oct 12 14:52:44 np0005481648.novalocal sudo[99431]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:44 np0005481648.novalocal sudo[99431]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:44 np0005481648.novalocal sudo[99434]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/octavia /var/log/weirdo-project/logs Oct 12 14:52:44 np0005481648.novalocal sudo[99434]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:44 np0005481648.novalocal sudo[99434]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:44 np0005481648.novalocal sudo[99437]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/ovn /var/log/weirdo-project/logs/etc/ Oct 12 14:52:44 np0005481648.novalocal sudo[99437]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:44 np0005481648.novalocal sudo[99437]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:44 np0005481648.novalocal sudo[99440]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/ovn /var/log/weirdo-project/logs Oct 12 14:52:44 np0005481648.novalocal sudo[99440]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:44 np0005481648.novalocal sudo[99440]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:44 np0005481648.novalocal sudo[99443]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/placement /var/log/weirdo-project/logs/etc/ Oct 12 14:52:44 np0005481648.novalocal sudo[99443]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:44 np0005481648.novalocal sudo[99443]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:44 np0005481648.novalocal sudo[99446]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/placement /var/log/weirdo-project/logs Oct 12 14:52:44 np0005481648.novalocal sudo[99446]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:44 np0005481648.novalocal sudo[99446]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:44 np0005481648.novalocal sudo[99449]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/tempest /var/log/weirdo-project/logs/etc/ Oct 12 14:52:44 np0005481648.novalocal sudo[99449]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:44 np0005481648.novalocal sudo[99449]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:44 np0005481648.novalocal sudo[99452]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/puppet/puppet.conf /var/log/weirdo-project/logs/ Oct 12 14:52:44 np0005481648.novalocal sudo[99452]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:44 np0005481648.novalocal sudo[99452]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:44 np0005481648.novalocal sudo[99456]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/journalctl --no-pager Oct 12 14:52:44 np0005481648.novalocal sudo[99456]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:44 np0005481648.novalocal sudo[99456]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:44 np0005481648.novalocal sudo[99459]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/rsyslog.d /var/log/weirdo-project/logs/etc/ Oct 12 14:52:44 np0005481648.novalocal sudo[99459]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:44 np0005481648.novalocal sudo[99459]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:44 np0005481648.novalocal sudo[99462]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/rsyslog.conf /var/log/weirdo-project/logs/etc/ Oct 12 14:52:44 np0005481648.novalocal sudo[99462]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:44 np0005481648.novalocal sudo[99462]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:44 np0005481648.novalocal sudo[99465]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sysconfig/network-scripts /var/log/weirdo-project/logs/etc/sysconfig/ Oct 12 14:52:44 np0005481648.novalocal sudo[99465]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:44 np0005481648.novalocal sudo[99465]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:44 np0005481648.novalocal sudo[99468]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/rabbitmq /var/log/weirdo-project/logs/etc/ Oct 12 14:52:44 np0005481648.novalocal sudo[99468]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:44 np0005481648.novalocal sudo[99468]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:44 np0005481648.novalocal sudo[99471]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/rabbitmq /var/log/weirdo-project/logs Oct 12 14:52:44 np0005481648.novalocal sudo[99471]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:44 np0005481648.novalocal sudo[99471]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:44 np0005481648.novalocal sudo[99474]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/my.cnf /var/log/weirdo-project/logs/etc/ Oct 12 14:52:44 np0005481648.novalocal sudo[99474]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:44 np0005481648.novalocal sudo[99474]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:44 np0005481648.novalocal sudo[99477]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/my.cnf.d /var/log/weirdo-project/logs/etc/ Oct 12 14:52:44 np0005481648.novalocal sudo[99477]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:44 np0005481648.novalocal sudo[99477]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:44 np0005481648.novalocal sudo[99480]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/mariadb /var/log/weirdo-project/logs/ Oct 12 14:52:44 np0005481648.novalocal sudo[99480]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:44 np0005481648.novalocal sudo[99480]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:44 np0005481648.novalocal sudo[99483]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/iscsi /var/log/weirdo-project/logs/etc/ Oct 12 14:52:44 np0005481648.novalocal sudo[99483]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:44 np0005481648.novalocal sudo[99483]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:45 np0005481648.novalocal sudo[99486]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/tempest.log /var/log/weirdo-project/logs/ Oct 12 14:52:45 np0005481648.novalocal sudo[99486]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:45 np0005481648.novalocal sudo[99486]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:45 np0005481648.novalocal sudo[99489]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/testrepository.subunit /var/log/weirdo-project/logs/testrepository.subunit Oct 12 14:52:45 np0005481648.novalocal sudo[99489]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:45 np0005481648.novalocal sudo[99489]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:45 np0005481648.novalocal sudo[99492]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/testr_results.html /var/log/weirdo-project/logs/testr_results.html Oct 12 14:52:45 np0005481648.novalocal sudo[99492]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:45 np0005481648.novalocal sudo[99492]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:45 np0005481648.novalocal sudo[99495]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dstat.log /var/log/weirdo-project/logs/ Oct 12 14:52:45 np0005481648.novalocal sudo[99495]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:45 np0005481648.novalocal sudo[99495]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:45 np0005481648.novalocal sudo[99498]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/iostat.log /var/log/weirdo-project/logs/ Oct 12 14:52:45 np0005481648.novalocal sudo[99498]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:45 np0005481648.novalocal sudo[99498]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:45 np0005481648.novalocal sudo[99501]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/iotop.log /var/log/weirdo-project/logs/ Oct 12 14:52:45 np0005481648.novalocal sudo[99501]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:45 np0005481648.novalocal sudo[99501]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:45 np0005481648.novalocal sudo[99504]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/libvirt /var/log/weirdo-project/logs/ Oct 12 14:52:45 np0005481648.novalocal sudo[99504]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:45 np0005481648.novalocal sudo[99504]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:45 np0005481648.novalocal sudo[99507]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/virsh net-list --all Oct 12 14:52:45 np0005481648.novalocal sudo[99507]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:45 np0005481648.novalocal virtqemud[90651]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Oct 12 14:52:45 np0005481648.novalocal sudo[99507]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:45 np0005481648.novalocal sudo[99511]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/libvirt /var/log/weirdo-project/logs/etc/ Oct 12 14:52:45 np0005481648.novalocal sudo[99511]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:45 np0005481648.novalocal sudo[99511]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:45 np0005481648.novalocal sudo[99514]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sysconfig/libvirt-guests /var/log/weirdo-project/logs/etc/sysconfig Oct 12 14:52:45 np0005481648.novalocal sudo[99514]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:45 np0005481648.novalocal sudo[99514]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:45 np0005481648.novalocal sudo[99517]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openvswitch /var/log/weirdo-project/logs/etc/ Oct 12 14:52:45 np0005481648.novalocal sudo[99517]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:45 np0005481648.novalocal sudo[99517]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:45 np0005481648.novalocal sudo[99520]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/openvswitch /var/log/weirdo-project/logs/ Oct 12 14:52:45 np0005481648.novalocal sudo[99520]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:45 np0005481648.novalocal sudo[99520]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:45 np0005481648.novalocal sudo[99524]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl show Oct 12 14:52:45 np0005481648.novalocal sudo[99524]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:45 np0005481648.novalocal sudo[99524]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:45 np0005481648.novalocal sudo[99527]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-connection Oct 12 14:52:45 np0005481648.novalocal sudo[99527]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:45 np0005481648.novalocal sudo[99527]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:45 np0005481648.novalocal sudo[99530]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-ssl Oct 12 14:52:45 np0005481648.novalocal sudo[99530]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:45 np0005481648.novalocal sudo[99530]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:45 np0005481648.novalocal sudo[99533]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl show Oct 12 14:52:45 np0005481648.novalocal sudo[99533]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:45 np0005481648.novalocal sudo[99533]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:45 np0005481648.novalocal sudo[99536]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-connection Oct 12 14:52:45 np0005481648.novalocal sudo[99536]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:45 np0005481648.novalocal sudo[99536]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:45 np0005481648.novalocal sudo[99539]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-ssl Oct 12 14:52:45 np0005481648.novalocal sudo[99539]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:45 np0005481648.novalocal sudo[99539]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:45 np0005481648.novalocal sudo[99542]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sysconfig/ovn-northd /var/log/weirdo-project/logs/etc/sysconfig/ Oct 12 14:52:45 np0005481648.novalocal sudo[99542]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:45 np0005481648.novalocal sudo[99542]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:45 np0005481648.novalocal sudo[99545]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sysconfig/ovn-controller /var/log/weirdo-project/logs/etc/sysconfig/ Oct 12 14:52:45 np0005481648.novalocal sudo[99545]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:45 np0005481648.novalocal sudo[99545]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:45 np0005481648.novalocal sudo[99548]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sudoers.d /var/log/weirdo-project/logs/ Oct 12 14:52:45 np0005481648.novalocal sudo[99548]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:45 np0005481648.novalocal sudo[99548]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:45 np0005481648.novalocal sudo[99552]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sudoers /var/log/weirdo-project/logs/sudoers.txt Oct 12 14:52:45 np0005481648.novalocal sudo[99552]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:45 np0005481648.novalocal sudo[99552]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:45 np0005481648.novalocal sudo[99557]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/magic /etc/httpd/conf/ports.conf /var/log/weirdo-project/logs/etc/httpd/conf/ Oct 12 14:52:45 np0005481648.novalocal sudo[99557]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:45 np0005481648.novalocal sudo[99557]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:45 np0005481648.novalocal sudo[99561]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf.d/10-cinder_wsgi.conf /etc/httpd/conf.d/10-glance_wsgi.conf /etc/httpd/conf.d/10-keystone_wsgi.conf /etc/httpd/conf.d/10-manila_wsgi.conf /etc/httpd/conf.d/10-neutron_wsgi.conf /etc/httpd/conf.d/10-nova_api_wsgi.conf /etc/httpd/conf.d/10-nova_metadata_wsgi.conf /etc/httpd/conf.d/10-octavia_wsgi.conf /etc/httpd/conf.d/10-placement_wsgi.conf /etc/httpd/conf.d/15-horizon_ssl_vhost.conf /etc/httpd/conf.d/15-horizon_vhost.conf /etc/httpd/conf.d/openstack-dashboard.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/ Oct 12 14:52:45 np0005481648.novalocal sudo[99561]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:45 np0005481648.novalocal sudo[99561]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:45 np0005481648.novalocal sudo[99565]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf.modules.d/alias.conf /etc/httpd/conf.modules.d/alias.load /etc/httpd/conf.modules.d/authz_core.load /etc/httpd/conf.modules.d/authz_host.load /etc/httpd/conf.modules.d/filter.load /etc/httpd/conf.modules.d/log_config.load /etc/httpd/conf.modules.d/mime.conf /etc/httpd/conf.modules.d/mime.load /etc/httpd/conf.modules.d/prefork.conf /etc/httpd/conf.modules.d/prefork.load /etc/httpd/conf.modules.d/setenvif.conf /etc/httpd/conf.modules.d/setenvif.load /etc/httpd/conf.modules.d/socache_shmcb.load /etc/httpd/conf.modules.d/ssl.conf /etc/httpd/conf.modules.d/ssl.load /etc/httpd/conf.modules.d/systemd.load /etc/httpd/conf.modules.d/unixd.load /etc/httpd/conf.modules.d/wsgi.conf /etc/httpd/conf.modules.d/wsgi.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ Oct 12 14:52:45 np0005481648.novalocal sudo[99565]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:45 np0005481648.novalocal sudo[99565]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:45 np0005481648.novalocal sudo[99568]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/httpd /var/log/weirdo-project/logs/apache Oct 12 14:52:45 np0005481648.novalocal sudo[99568]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:45 np0005481648.novalocal sudo[99568]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:45 np0005481648.novalocal sudo[99571]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/redis /var/log/weirdo-project/logs/ Oct 12 14:52:45 np0005481648.novalocal sudo[99571]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:45 np0005481648.novalocal sudo[99571]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:45 np0005481648.novalocal sudo[99574]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/redis /var/log/weirdo-project/logs/etc/ Oct 12 14:52:45 np0005481648.novalocal sudo[99574]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:45 np0005481648.novalocal sudo[99574]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:45 np0005481648.novalocal sudo[99577]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/audit/audit.log /var/log/weirdo-project/logs/audit.log.txt Oct 12 14:52:45 np0005481648.novalocal sudo[99577]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:45 np0005481648.novalocal sudo[99577]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:45 np0005481648.novalocal sudo[99580]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/spool/cron /var/log/weirdo-project/logs/ Oct 12 14:52:45 np0005481648.novalocal sudo[99580]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:45 np0005481648.novalocal sudo[99580]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:45 np0005481648.novalocal sudo[99583]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/etc/tempest.conf /var/log/weirdo-project/logs/tempest.conf.txt Oct 12 14:52:45 np0005481648.novalocal sudo[99583]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:45 np0005481648.novalocal sudo[99583]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:45 np0005481648.novalocal sudo[99586]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openstack-dashboard /var/log/weirdo-project/logs/etc/openstack-dashboard Oct 12 14:52:46 np0005481648.novalocal sudo[99586]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:46 np0005481648.novalocal sudo[99586]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:46 np0005481648.novalocal sudo[99590]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt Oct 12 14:52:46 np0005481648.novalocal sudo[99590]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:46 np0005481648.novalocal sudo[99590]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:46 np0005481648.novalocal sudo[99594]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt Oct 12 14:52:46 np0005481648.novalocal sudo[99594]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:46 np0005481648.novalocal sudo[99594]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:46 np0005481648.novalocal sudo[99597]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/enabled /var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt Oct 12 14:52:46 np0005481648.novalocal sudo[99597]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:46 np0005481648.novalocal sudo[99597]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:46 np0005481648.novalocal sudo[99600]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt Oct 12 14:52:46 np0005481648.novalocal sudo[99600]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:46 np0005481648.novalocal sudo[99600]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:46 np0005481648.novalocal sudo[99603]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt Oct 12 14:52:46 np0005481648.novalocal sudo[99603]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:46 np0005481648.novalocal sudo[99603]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:46 np0005481648.novalocal sudo[99606]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt Oct 12 14:52:46 np0005481648.novalocal sudo[99606]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:46 np0005481648.novalocal sudo[99606]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:46 np0005481648.novalocal sudo[99609]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt Oct 12 14:52:46 np0005481648.novalocal sudo[99609]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:46 np0005481648.novalocal sudo[99609]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:46 np0005481648.novalocal sudo[99612]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt Oct 12 14:52:46 np0005481648.novalocal sudo[99612]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:46 np0005481648.novalocal sudo[99612]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:46 np0005481648.novalocal sudo[99615]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt Oct 12 14:52:46 np0005481648.novalocal sudo[99615]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:46 np0005481648.novalocal sudo[99615]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:46 np0005481648.novalocal sudo[99618]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt Oct 12 14:52:46 np0005481648.novalocal sudo[99618]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:46 np0005481648.novalocal sudo[99618]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:46 np0005481648.novalocal sudo[99621]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt Oct 12 14:52:46 np0005481648.novalocal sudo[99621]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:46 np0005481648.novalocal sudo[99621]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:46 np0005481648.novalocal sudo[99624]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt Oct 12 14:52:46 np0005481648.novalocal sudo[99624]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:46 np0005481648.novalocal sudo[99624]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:46 np0005481648.novalocal sudo[99628]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/rsyncd.conf /var/log/weirdo-project/logs/etc/rsyncd.conf Oct 12 14:52:46 np0005481648.novalocal sudo[99628]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:46 np0005481648.novalocal sudo[99628]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:46 np0005481648.novalocal sudo[99635]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf repolist -v Oct 12 14:52:46 np0005481648.novalocal sudo[99635]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:49 np0005481648.novalocal sudo[99635]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:49 np0005481648.novalocal sudo[99638]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf list installed Oct 12 14:52:49 np0005481648.novalocal sudo[99638]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:50 np0005481648.novalocal sudo[99638]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:50 np0005481648.novalocal sudo[99641]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf module list Oct 12 14:52:50 np0005481648.novalocal sudo[99641]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:51 np0005481648.novalocal sudo[99641]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:51 np0005481648.novalocal sudo[99644]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/yum.repos.d /var/log/weirdo-project/logs/etc/yum.repos.d Oct 12 14:52:51 np0005481648.novalocal sudo[99644]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:51 np0005481648.novalocal sudo[99644]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:51 np0005481648.novalocal sudo[99648]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dnf.log /var/log/weirdo-project/logs/dnf Oct 12 14:52:51 np0005481648.novalocal sudo[99648]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:51 np0005481648.novalocal sudo[99648]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:51 np0005481648.novalocal sudo[99651]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dnf.rpm.log /var/log/weirdo-project/logs/dnf Oct 12 14:52:51 np0005481648.novalocal sudo[99651]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:51 np0005481648.novalocal sudo[99651]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:51 np0005481648.novalocal sudo[99657]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/passwd /var/log/weirdo-project/logs/etc Oct 12 14:52:51 np0005481648.novalocal sudo[99657]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:51 np0005481648.novalocal sudo[99657]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:51 np0005481648.novalocal sudo[99660]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/group /var/log/weirdo-project/logs/etc Oct 12 14:52:51 np0005481648.novalocal sudo[99660]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:51 np0005481648.novalocal sudo[99660]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:52 np0005481648.novalocal sudo[99663]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openstack /var/log/weirdo-project/logs/etc Oct 12 14:52:52 np0005481648.novalocal sudo[99663]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:52 np0005481648.novalocal sudo[99663]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:52 np0005481648.novalocal sudo[99666]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/chmod 777 /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml Oct 12 14:52:52 np0005481648.novalocal sudo[99666]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:52 np0005481648.novalocal sudo[99666]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:52 np0005481648.novalocal sudo[99673]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ps -eo user,pid,ppid,lwp,%cpu,%mem,size,rss,cmd Oct 12 14:52:52 np0005481648.novalocal sudo[99673]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:52 np0005481648.novalocal sudo[99673]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:52 np0005481648.novalocal sudo[99676]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/ip -d address Oct 12 14:52:52 np0005481648.novalocal sudo[99676]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:52 np0005481648.novalocal sudo[99676]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:52 np0005481648.novalocal sudo[99682]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovs-vsctl list open_vswitch Oct 12 14:52:52 np0005481648.novalocal sudo[99682]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:52 np0005481648.novalocal sudo[99682]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:52 np0005481648.novalocal sudo[99685]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovs-vsctl show Oct 12 14:52:52 np0005481648.novalocal sudo[99685]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:52 np0005481648.novalocal sudo[99685]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:52 np0005481648.novalocal sudo[99689]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-connection Oct 12 14:52:52 np0005481648.novalocal sudo[99689]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:52 np0005481648.novalocal sudo[99689]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:52 np0005481648.novalocal sudo[99692]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl list connection Oct 12 14:52:52 np0005481648.novalocal sudo[99692]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:52 np0005481648.novalocal sudo[99692]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:52 np0005481648.novalocal sudo[99695]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl show Oct 12 14:52:52 np0005481648.novalocal sudo[99695]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:52 np0005481648.novalocal sudo[99695]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:52 np0005481648.novalocal sudo[99699]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-connection Oct 12 14:52:52 np0005481648.novalocal sudo[99699]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:52 np0005481648.novalocal sudo[99699]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:52 np0005481648.novalocal sudo[99702]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl list connection Oct 12 14:52:52 np0005481648.novalocal sudo[99702]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:52 np0005481648.novalocal sudo[99702]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:52 np0005481648.novalocal sudo[99705]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl show Oct 12 14:52:52 np0005481648.novalocal sudo[99705]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:52 np0005481648.novalocal sudo[99705]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:52 np0005481648.novalocal sudo[99708]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/netstat -tulpn Oct 12 14:52:52 np0005481648.novalocal sudo[99708]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:52 np0005481648.novalocal sudo[99708]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:52 np0005481648.novalocal sudo[99711]: root : PWD=/tmp/puppet-openstack ; USER=root ; ENV=LC_CTYPE=C SYSTEMD_COLORS=false ; COMMAND=/bin/systemctl status --all --no-pager Oct 12 14:52:52 np0005481648.novalocal sudo[99711]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:54 np0005481648.novalocal sudo[99711]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:54 np0005481648.novalocal sudo[99714]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t raw -vnxL Oct 12 14:52:54 np0005481648.novalocal sudo[99714]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:54 np0005481648.novalocal sudo[99714]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:54 np0005481648.novalocal sudo[99717]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t filter -vnxL Oct 12 14:52:54 np0005481648.novalocal sudo[99717]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:54 np0005481648.novalocal sudo[99717]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:54 np0005481648.novalocal sudo[99720]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t nat -vnxL Oct 12 14:52:54 np0005481648.novalocal sudo[99720]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:54 np0005481648.novalocal sudo[99720]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:54 np0005481648.novalocal sudo[99723]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t mangle -vnxL Oct 12 14:52:54 np0005481648.novalocal sudo[99723]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:54 np0005481648.novalocal sudo[99723]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:54 np0005481648.novalocal sudo[99726]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/fstab /var/log/weirdo-project/logs/etc/ Oct 12 14:52:54 np0005481648.novalocal sudo[99726]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:54 np0005481648.novalocal sudo[99726]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:54 np0005481648.novalocal sudo[99729]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mount Oct 12 14:52:54 np0005481648.novalocal sudo[99729]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:54 np0005481648.novalocal sudo[99729]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:54 np0005481648.novalocal sudo[99732]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/losetup -al Oct 12 14:52:54 np0005481648.novalocal sudo[99732]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:54 np0005481648.novalocal sudo[99732]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:54 np0005481648.novalocal sudo[99735]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/pvs Oct 12 14:52:54 np0005481648.novalocal sudo[99735]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:54 np0005481648.novalocal sudo[99735]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:54 np0005481648.novalocal sudo[99738]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/vgs Oct 12 14:52:54 np0005481648.novalocal sudo[99738]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:54 np0005481648.novalocal sudo[99738]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:54 np0005481648.novalocal sudo[99741]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/lvs Oct 12 14:52:54 np0005481648.novalocal sudo[99741]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:54 np0005481648.novalocal sudo[99741]: pam_unix(sudo:session): session closed for user root Oct 12 14:52:54 np0005481648.novalocal sudo[99745]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/semanage boolean --list Oct 12 14:52:54 np0005481648.novalocal sudo[99745]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:52:55 np0005481648.novalocal sudo[99745]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:00 np0005481648.novalocal systemd[1]: Starting system activity accounting tool... Oct 12 14:53:00 np0005481648.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Oct 12 14:53:00 np0005481648.novalocal systemd[1]: Finished system activity accounting tool. Oct 12 14:53:00 np0005481648.novalocal sudo[99757]: root : PWD=/tmp/puppet-openstack ; USER=nova ; COMMAND=/bin/nova-manage cell_v2 list_cells --verbose Oct 12 14:53:00 np0005481648.novalocal sudo[99757]: pam_unix(sudo:session): session opened for user nova(uid=162) by zuul-worker(uid=0) Oct 12 14:53:03 np0005481648.novalocal sudo[99757]: pam_unix(sudo:session): session closed for user nova Oct 12 14:53:03 np0005481648.novalocal sudo[99765]: root : PWD=/tmp/puppet-openstack ; USER=nova ; COMMAND=/bin/nova-manage cell_v2 list_hosts Oct 12 14:53:03 np0005481648.novalocal sudo[99765]: pam_unix(sudo:session): session opened for user nova(uid=162) by zuul-worker(uid=0) Oct 12 14:53:06 np0005481648.novalocal sudo[99765]: pam_unix(sudo:session): session closed for user nova Oct 12 14:53:17 np0005481648.novalocal sudo[99831]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type d -execdir sudo chmod 755 {} ; Oct 12 14:53:17 np0005481648.novalocal sudo[99831]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:17 np0005481648.novalocal sudo[99834]: root : PWD=/var/log/weirdo-project ; USER=root ; COMMAND=/bin/chmod 755 ./logs Oct 12 14:53:17 np0005481648.novalocal sudo[99834]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:17 np0005481648.novalocal sudo[99834]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:18 np0005481648.novalocal sudo[99837]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./etc Oct 12 14:53:18 np0005481648.novalocal sudo[99837]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:18 np0005481648.novalocal sudo[99837]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:18 np0005481648.novalocal sudo[99840]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./sysconfig Oct 12 14:53:18 np0005481648.novalocal sudo[99840]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:18 np0005481648.novalocal sudo[99840]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:18 np0005481648.novalocal sudo[99843]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 755 ./network-scripts Oct 12 14:53:18 np0005481648.novalocal sudo[99843]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:18 np0005481648.novalocal sudo[99843]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:18 np0005481648.novalocal sudo[99846]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./ceph Oct 12 14:53:18 np0005481648.novalocal sudo[99846]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:18 np0005481648.novalocal sudo[99846]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:18 np0005481648.novalocal sudo[99849]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./cinder Oct 12 14:53:18 np0005481648.novalocal sudo[99849]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:18 np0005481648.novalocal sudo[99849]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:18 np0005481648.novalocal sudo[99852]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./rootwrap.d Oct 12 14:53:18 np0005481648.novalocal sudo[99852]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:18 np0005481648.novalocal sudo[99852]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:18 np0005481648.novalocal sudo[99856]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./volumes Oct 12 14:53:18 np0005481648.novalocal sudo[99856]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:18 np0005481648.novalocal sudo[99856]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:18 np0005481648.novalocal sudo[99859]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Oct 12 14:53:18 np0005481648.novalocal sudo[99859]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:18 np0005481648.novalocal sudo[99859]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:18 np0005481648.novalocal sudo[99862]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Oct 12 14:53:18 np0005481648.novalocal sudo[99862]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:18 np0005481648.novalocal sudo[99862]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:18 np0005481648.novalocal sudo[99865]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./glance Oct 12 14:53:18 np0005481648.novalocal sudo[99865]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:18 np0005481648.novalocal sudo[99865]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:18 np0005481648.novalocal sudo[99868]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./metadefs Oct 12 14:53:18 np0005481648.novalocal sudo[99868]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:18 np0005481648.novalocal sudo[99868]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:18 np0005481648.novalocal sudo[99871]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./rootwrap.d Oct 12 14:53:18 np0005481648.novalocal sudo[99871]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:18 np0005481648.novalocal sudo[99871]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:18 np0005481648.novalocal sudo[99874]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Oct 12 14:53:18 np0005481648.novalocal sudo[99874]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:18 np0005481648.novalocal sudo[99874]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:18 np0005481648.novalocal sudo[99877]: root : PWD=/var/log/weirdo-project/logs/etc/glance/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Oct 12 14:53:18 np0005481648.novalocal sudo[99877]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:18 np0005481648.novalocal sudo[99877]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:18 np0005481648.novalocal sudo[99880]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./keystone Oct 12 14:53:18 np0005481648.novalocal sudo[99880]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:18 np0005481648.novalocal sudo[99880]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:18 np0005481648.novalocal sudo[99883]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./fernet-keys Oct 12 14:53:18 np0005481648.novalocal sudo[99883]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:18 np0005481648.novalocal sudo[99883]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:18 np0005481648.novalocal sudo[99886]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./credential-keys Oct 12 14:53:18 np0005481648.novalocal sudo[99886]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:18 np0005481648.novalocal sudo[99886]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:18 np0005481648.novalocal sudo[99889]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./policy.d Oct 12 14:53:18 np0005481648.novalocal sudo[99889]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:18 np0005481648.novalocal sudo[99889]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:18 np0005481648.novalocal sudo[99892]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Oct 12 14:53:18 np0005481648.novalocal sudo[99892]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:18 np0005481648.novalocal sudo[99892]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:18 np0005481648.novalocal sudo[99895]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Oct 12 14:53:18 np0005481648.novalocal sudo[99895]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:18 np0005481648.novalocal sudo[99895]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:18 np0005481648.novalocal sudo[99898]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./manila Oct 12 14:53:18 np0005481648.novalocal sudo[99898]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:18 np0005481648.novalocal sudo[99898]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:18 np0005481648.novalocal sudo[99901]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Oct 12 14:53:18 np0005481648.novalocal sudo[99901]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:18 np0005481648.novalocal sudo[99901]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:18 np0005481648.novalocal sudo[99904]: root : PWD=/var/log/weirdo-project/logs/etc/manila/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Oct 12 14:53:18 np0005481648.novalocal sudo[99904]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:18 np0005481648.novalocal sudo[99904]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:18 np0005481648.novalocal sudo[99907]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./neutron Oct 12 14:53:18 np0005481648.novalocal sudo[99907]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:18 np0005481648.novalocal sudo[99907]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:18 np0005481648.novalocal sudo[99910]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Oct 12 14:53:18 np0005481648.novalocal sudo[99910]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:18 np0005481648.novalocal sudo[99910]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:18 np0005481648.novalocal sudo[99913]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Oct 12 14:53:18 np0005481648.novalocal sudo[99913]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:18 np0005481648.novalocal sudo[99913]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:18 np0005481648.novalocal sudo[99916]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./kill_scripts Oct 12 14:53:18 np0005481648.novalocal sudo[99916]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:18 np0005481648.novalocal sudo[99916]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:18 np0005481648.novalocal sudo[99919]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Oct 12 14:53:18 np0005481648.novalocal sudo[99919]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:18 np0005481648.novalocal sudo[99919]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:18 np0005481648.novalocal sudo[99922]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-rpc-server Oct 12 14:53:18 np0005481648.novalocal sudo[99922]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:18 np0005481648.novalocal sudo[99922]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:18 np0005481648.novalocal sudo[99925]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-dhcp-agent Oct 12 14:53:18 np0005481648.novalocal sudo[99925]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:18 np0005481648.novalocal sudo[99925]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:18 np0005481648.novalocal sudo[99928]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-l3-agent Oct 12 14:53:18 np0005481648.novalocal sudo[99928]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:18 np0005481648.novalocal sudo[99928]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:18 np0005481648.novalocal sudo[99931]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-metadata-agent Oct 12 14:53:18 np0005481648.novalocal sudo[99931]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:18 np0005481648.novalocal sudo[99931]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:18 np0005481648.novalocal sudo[99934]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-vpn-agent Oct 12 14:53:18 np0005481648.novalocal sudo[99934]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:18 np0005481648.novalocal sudo[99934]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:19 np0005481648.novalocal sudo[99937]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-netns-cleanup Oct 12 14:53:19 np0005481648.novalocal sudo[99937]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:19 np0005481648.novalocal sudo[99937]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:19 np0005481648.novalocal sudo[99940]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-ovs-cleanup Oct 12 14:53:19 np0005481648.novalocal sudo[99940]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:19 np0005481648.novalocal sudo[99940]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:19 np0005481648.novalocal sudo[99943]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-server Oct 12 14:53:19 np0005481648.novalocal sudo[99943]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:19 np0005481648.novalocal sudo[99943]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:19 np0005481648.novalocal sudo[99946]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./common Oct 12 14:53:19 np0005481648.novalocal sudo[99946]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:19 np0005481648.novalocal sudo[99946]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:19 np0005481648.novalocal sudo[99949]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-ovn-agent Oct 12 14:53:19 np0005481648.novalocal sudo[99949]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:19 np0005481648.novalocal sudo[99949]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:19 np0005481648.novalocal sudo[99952]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./plugins Oct 12 14:53:19 np0005481648.novalocal sudo[99952]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:19 np0005481648.novalocal sudo[99952]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:19 np0005481648.novalocal sudo[99955]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins ; USER=root ; COMMAND=/bin/chmod 755 ./ml2 Oct 12 14:53:19 np0005481648.novalocal sudo[99955]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:19 np0005481648.novalocal sudo[99955]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:19 np0005481648.novalocal sudo[99958]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins ; USER=root ; COMMAND=/bin/chmod 755 ./networking-ovn Oct 12 14:53:19 np0005481648.novalocal sudo[99958]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:19 np0005481648.novalocal sudo[99958]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:19 np0005481648.novalocal sudo[99961]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./nova Oct 12 14:53:19 np0005481648.novalocal sudo[99961]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:19 np0005481648.novalocal sudo[99961]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:19 np0005481648.novalocal sudo[99964]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Oct 12 14:53:19 np0005481648.novalocal sudo[99964]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:19 np0005481648.novalocal sudo[99964]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:19 np0005481648.novalocal sudo[99967]: root : PWD=/var/log/weirdo-project/logs/etc/nova/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Oct 12 14:53:19 np0005481648.novalocal sudo[99967]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:19 np0005481648.novalocal sudo[99967]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:19 np0005481648.novalocal sudo[99970]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./octavia Oct 12 14:53:19 np0005481648.novalocal sudo[99970]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:19 np0005481648.novalocal sudo[99970]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:19 np0005481648.novalocal sudo[99973]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./certs Oct 12 14:53:19 np0005481648.novalocal sudo[99973]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:19 np0005481648.novalocal sudo[99973]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:19 np0005481648.novalocal sudo[99976]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Oct 12 14:53:19 np0005481648.novalocal sudo[99976]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:19 np0005481648.novalocal sudo[99976]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:19 np0005481648.novalocal sudo[99979]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-worker Oct 12 14:53:19 np0005481648.novalocal sudo[99979]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:19 np0005481648.novalocal sudo[99979]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:19 np0005481648.novalocal sudo[99982]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-housekeeping Oct 12 14:53:19 np0005481648.novalocal sudo[99982]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:19 np0005481648.novalocal sudo[99982]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:19 np0005481648.novalocal sudo[99985]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-api Oct 12 14:53:19 np0005481648.novalocal sudo[99985]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:19 np0005481648.novalocal sudo[99985]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:19 np0005481648.novalocal sudo[99988]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./common Oct 12 14:53:19 np0005481648.novalocal sudo[99988]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:19 np0005481648.novalocal sudo[99988]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:19 np0005481648.novalocal sudo[99991]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-health-manager Oct 12 14:53:19 np0005481648.novalocal sudo[99991]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:19 np0005481648.novalocal sudo[99991]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:19 np0005481648.novalocal sudo[99994]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-driver-agent Oct 12 14:53:19 np0005481648.novalocal sudo[99994]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:19 np0005481648.novalocal sudo[99994]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:19 np0005481648.novalocal sudo[99997]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Oct 12 14:53:19 np0005481648.novalocal sudo[99997]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:19 np0005481648.novalocal sudo[99997]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:19 np0005481648.novalocal sudo[100000]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Oct 12 14:53:19 np0005481648.novalocal sudo[100000]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:19 np0005481648.novalocal sudo[100000]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:19 np0005481648.novalocal sudo[100003]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./ovn Oct 12 14:53:19 np0005481648.novalocal sudo[100003]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:19 np0005481648.novalocal sudo[100003]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:19 np0005481648.novalocal sudo[100006]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./placement Oct 12 14:53:19 np0005481648.novalocal sudo[100006]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:19 np0005481648.novalocal sudo[100006]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:19 np0005481648.novalocal sudo[100009]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Oct 12 14:53:19 np0005481648.novalocal sudo[100009]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:19 np0005481648.novalocal sudo[100009]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:19 np0005481648.novalocal sudo[100012]: root : PWD=/var/log/weirdo-project/logs/etc/placement/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Oct 12 14:53:19 np0005481648.novalocal sudo[100012]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:19 np0005481648.novalocal sudo[100012]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:19 np0005481648.novalocal sudo[100015]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./tempest Oct 12 14:53:19 np0005481648.novalocal sudo[100015]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:19 np0005481648.novalocal sudo[100015]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:19 np0005481648.novalocal sudo[100018]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./rsyslog.d Oct 12 14:53:19 np0005481648.novalocal sudo[100018]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:19 np0005481648.novalocal sudo[100018]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:19 np0005481648.novalocal sudo[100021]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./rabbitmq Oct 12 14:53:19 np0005481648.novalocal sudo[100021]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:19 np0005481648.novalocal sudo[100021]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:19 np0005481648.novalocal sudo[100024]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Oct 12 14:53:19 np0005481648.novalocal sudo[100024]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:19 np0005481648.novalocal sudo[100024]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:19 np0005481648.novalocal sudo[100027]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Oct 12 14:53:19 np0005481648.novalocal sudo[100027]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:19 np0005481648.novalocal sudo[100027]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:19 np0005481648.novalocal sudo[100030]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./my.cnf.d Oct 12 14:53:19 np0005481648.novalocal sudo[100030]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:19 np0005481648.novalocal sudo[100030]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:19 np0005481648.novalocal sudo[100033]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./iscsi Oct 12 14:53:19 np0005481648.novalocal sudo[100033]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:19 np0005481648.novalocal sudo[100033]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100036]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./libvirt Oct 12 14:53:20 np0005481648.novalocal sudo[100036]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100036]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100039]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./storage Oct 12 14:53:20 np0005481648.novalocal sudo[100039]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100039]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100042]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/storage ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Oct 12 14:53:20 np0005481648.novalocal sudo[100042]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100042]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100045]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./secrets Oct 12 14:53:20 np0005481648.novalocal sudo[100045]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100045]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100048]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./qemu Oct 12 14:53:20 np0005481648.novalocal sudo[100048]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100048]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100051]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 755 ./networks Oct 12 14:53:20 np0005481648.novalocal sudo[100051]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100051]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100054]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Oct 12 14:53:20 np0005481648.novalocal sudo[100054]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100054]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100057]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Oct 12 14:53:20 np0005481648.novalocal sudo[100057]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100057]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100060]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./nwfilter Oct 12 14:53:20 np0005481648.novalocal sudo[100060]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100060]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100063]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openvswitch Oct 12 14:53:20 np0005481648.novalocal sudo[100063]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100063]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100066]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./httpd Oct 12 14:53:20 np0005481648.novalocal sudo[100066]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100066]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100069]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf Oct 12 14:53:20 np0005481648.novalocal sudo[100069]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100069]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100072]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Oct 12 14:53:20 np0005481648.novalocal sudo[100072]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100072]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100075]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf.modules.d Oct 12 14:53:20 np0005481648.novalocal sudo[100075]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100075]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100078]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./redis Oct 12 14:53:20 np0005481648.novalocal sudo[100078]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100078]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100081]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Oct 12 14:53:20 np0005481648.novalocal sudo[100081]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100081]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100084]: root : PWD=/var/log/weirdo-project/logs/etc/redis/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Oct 12 14:53:20 np0005481648.novalocal sudo[100084]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100084]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100087]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openstack-dashboard Oct 12 14:53:20 np0005481648.novalocal sudo[100087]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100087]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100090]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./default_policies.txt Oct 12 14:53:20 np0005481648.novalocal sudo[100090]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100090]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100093]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./enabled.txt Oct 12 14:53:20 np0005481648.novalocal sudo[100093]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100093]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100096]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./local_settings.d.txt Oct 12 14:53:20 np0005481648.novalocal sudo[100096]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100096]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100099]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./nova_policy.d.txt Oct 12 14:53:20 np0005481648.novalocal sudo[100099]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100099]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100102]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./ssl.txt Oct 12 14:53:20 np0005481648.novalocal sudo[100102]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100102]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100105]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt ; USER=root ; COMMAND=/bin/chmod 755 ./private Oct 12 14:53:20 np0005481648.novalocal sudo[100105]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100105]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100108]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./yum.repos.d Oct 12 14:53:20 np0005481648.novalocal sudo[100108]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100108]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100111]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openstack Oct 12 14:53:20 np0005481648.novalocal sudo[100111]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100111]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100114]: root : PWD=/var/log/weirdo-project/logs/etc/openstack ; USER=root ; COMMAND=/bin/chmod 755 ./puppet Oct 12 14:53:20 np0005481648.novalocal sudo[100114]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100114]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100117]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./cinder Oct 12 14:53:20 np0005481648.novalocal sudo[100117]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100117]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100120]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./glance Oct 12 14:53:20 np0005481648.novalocal sudo[100120]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100120]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100123]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./horizon Oct 12 14:53:20 np0005481648.novalocal sudo[100123]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100123]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100126]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./keystone Oct 12 14:53:20 np0005481648.novalocal sudo[100126]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100126]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100129]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./manila Oct 12 14:53:20 np0005481648.novalocal sudo[100129]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100129]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100132]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./neutron Oct 12 14:53:20 np0005481648.novalocal sudo[100132]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100132]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100135]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./nova Oct 12 14:53:20 np0005481648.novalocal sudo[100135]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100135]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100138]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./octavia Oct 12 14:53:20 np0005481648.novalocal sudo[100138]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100138]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100141]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./ovn Oct 12 14:53:20 np0005481648.novalocal sudo[100141]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100141]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:20 np0005481648.novalocal sudo[100144]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./placement Oct 12 14:53:20 np0005481648.novalocal sudo[100144]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:20 np0005481648.novalocal sudo[100144]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:21 np0005481648.novalocal sudo[100147]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./rabbitmq Oct 12 14:53:21 np0005481648.novalocal sudo[100147]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:21 np0005481648.novalocal sudo[100147]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:21 np0005481648.novalocal sudo[100150]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./mariadb Oct 12 14:53:21 np0005481648.novalocal sudo[100150]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:21 np0005481648.novalocal sudo[100150]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:21 np0005481648.novalocal sudo[100153]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./libvirt Oct 12 14:53:21 np0005481648.novalocal sudo[100153]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:21 np0005481648.novalocal sudo[100153]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:21 np0005481648.novalocal sudo[100156]: root : PWD=/var/log/weirdo-project/logs/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./qemu Oct 12 14:53:21 np0005481648.novalocal sudo[100156]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:21 np0005481648.novalocal sudo[100156]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:21 np0005481648.novalocal sudo[100159]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./openvswitch Oct 12 14:53:21 np0005481648.novalocal sudo[100159]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:21 np0005481648.novalocal sudo[100159]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:21 np0005481648.novalocal sudo[100162]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./sudoers.d Oct 12 14:53:21 np0005481648.novalocal sudo[100162]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:21 np0005481648.novalocal sudo[100162]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:21 np0005481648.novalocal sudo[100165]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./apache Oct 12 14:53:21 np0005481648.novalocal sudo[100165]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:21 np0005481648.novalocal sudo[100165]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:21 np0005481648.novalocal sudo[100168]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./redis Oct 12 14:53:21 np0005481648.novalocal sudo[100168]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:21 np0005481648.novalocal sudo[100168]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:21 np0005481648.novalocal sudo[100171]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./cron Oct 12 14:53:21 np0005481648.novalocal sudo[100171]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:21 np0005481648.novalocal sudo[100171]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:21 np0005481648.novalocal sudo[100174]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./dnf Oct 12 14:53:21 np0005481648.novalocal sudo[100174]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:21 np0005481648.novalocal sudo[100174]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:21 np0005481648.novalocal sudo[100177]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./openstack_resources Oct 12 14:53:21 np0005481648.novalocal sudo[100177]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:21 np0005481648.novalocal sudo[100177]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:21 np0005481648.novalocal sudo[99831]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:21 np0005481648.novalocal sudo[100180]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type f -execdir sudo chmod 644 {} ; Oct 12 14:53:21 np0005481648.novalocal sudo[100180]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:21 np0005481648.novalocal sudo[100183]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet-20251012_143630.log Oct 12 14:53:21 np0005481648.novalocal sudo[100183]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:21 np0005481648.novalocal sudo[100183]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:21 np0005481648.novalocal sudo[100186]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet-20251012_143932.log Oct 12 14:53:21 np0005481648.novalocal sudo[100186]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:21 np0005481648.novalocal sudo[100186]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:21 np0005481648.novalocal sudo[100189]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-eth Oct 12 14:53:21 np0005481648.novalocal sudo[100189]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:21 np0005481648.novalocal sudo[100189]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:21 np0005481648.novalocal sudo[100192]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-ipv6 Oct 12 14:53:21 np0005481648.novalocal sudo[100192]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:21 np0005481648.novalocal sudo[100192]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:21 np0005481648.novalocal sudo[100195]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-ovs Oct 12 14:53:21 np0005481648.novalocal sudo[100195]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:21 np0005481648.novalocal sudo[100195]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:21 np0005481648.novalocal sudo[100198]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-post Oct 12 14:53:21 np0005481648.novalocal sudo[100198]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:21 np0005481648.novalocal sudo[100198]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:21 np0005481648.novalocal sudo[100201]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-routes Oct 12 14:53:21 np0005481648.novalocal sudo[100201]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:21 np0005481648.novalocal sudo[100201]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:21 np0005481648.novalocal sudo[100204]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-tunnel Oct 12 14:53:21 np0005481648.novalocal sudo[100204]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:21 np0005481648.novalocal sudo[100204]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:21 np0005481648.novalocal sudo[100207]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./init.ipv6-global Oct 12 14:53:21 np0005481648.novalocal sudo[100207]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:21 np0005481648.novalocal sudo[100207]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:21 np0005481648.novalocal sudo[100210]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./network-functions Oct 12 14:53:21 np0005481648.novalocal sudo[100210]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:21 np0005481648.novalocal sudo[100210]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:21 np0005481648.novalocal sudo[100213]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./network-functions-ipv6 Oct 12 14:53:21 np0005481648.novalocal sudo[100213]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:21 np0005481648.novalocal sudo[100213]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:21 np0005481648.novalocal sudo[100216]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-br-ex Oct 12 14:53:21 np0005481648.novalocal sudo[100216]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:21 np0005481648.novalocal sudo[100216]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:21 np0005481648.novalocal sudo[100219]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-lo Oct 12 14:53:21 np0005481648.novalocal sudo[100219]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:21 np0005481648.novalocal sudo[100219]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:21 np0005481648.novalocal sudo[100222]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown Oct 12 14:53:21 np0005481648.novalocal sudo[100222]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:21 np0005481648.novalocal sudo[100222]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:21 np0005481648.novalocal sudo[100225]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-eth Oct 12 14:53:21 np0005481648.novalocal sudo[100225]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:21 np0005481648.novalocal sudo[100225]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:21 np0005481648.novalocal sudo[100228]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-ipv6 Oct 12 14:53:21 np0005481648.novalocal sudo[100228]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:21 np0005481648.novalocal sudo[100228]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:21 np0005481648.novalocal sudo[100231]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-ovs Oct 12 14:53:21 np0005481648.novalocal sudo[100231]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100231]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100234]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-post Oct 12 14:53:22 np0005481648.novalocal sudo[100234]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100234]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100237]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-routes Oct 12 14:53:22 np0005481648.novalocal sudo[100237]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100237]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100240]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-tunnel Oct 12 14:53:22 np0005481648.novalocal sudo[100240]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100240]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100243]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup Oct 12 14:53:22 np0005481648.novalocal sudo[100243]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100243]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100246]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-aliases Oct 12 14:53:22 np0005481648.novalocal sudo[100246]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100246]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100249]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-eth0 Oct 12 14:53:22 np0005481648.novalocal sudo[100249]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100249]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100252]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./readme-ifcfg-rh.txt Oct 12 14:53:22 np0005481648.novalocal sudo[100252]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100252]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100255]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-loop1 Oct 12 14:53:22 np0005481648.novalocal sudo[100255]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100255]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100258]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt-guests Oct 12 14:53:22 np0005481648.novalocal sudo[100258]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100258]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100261]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-northd Oct 12 14:53:22 np0005481648.novalocal sudo[100261]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100261]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100264]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-controller Oct 12 14:53:22 np0005481648.novalocal sudo[100264]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100264]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100267]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Oct 12 14:53:22 np0005481648.novalocal sudo[100267]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100267]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100270]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.conf Oct 12 14:53:22 np0005481648.novalocal sudo[100270]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100270]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100273]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./resource_filters.json Oct 12 14:53:22 np0005481648.novalocal sudo[100273]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100273]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100276]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Oct 12 14:53:22 np0005481648.novalocal sudo[100276]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100276]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100279]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Oct 12 14:53:22 np0005481648.novalocal sudo[100279]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100279]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100282]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005481648.novalocal.pem Oct 12 14:53:22 np0005481648.novalocal sudo[100282]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100282]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100285]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Oct 12 14:53:22 np0005481648.novalocal sudo[100285]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100285]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100288]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-api-paste.ini Oct 12 14:53:22 np0005481648.novalocal sudo[100288]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100288]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100291]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-api.conf Oct 12 14:53:22 np0005481648.novalocal sudo[100291]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100291]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100294]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-cache.conf Oct 12 14:53:22 np0005481648.novalocal sudo[100294]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100294]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100297]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-image-import.conf Oct 12 14:53:22 np0005481648.novalocal sudo[100297]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100297]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100300]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-scrubber.conf Oct 12 14:53:22 np0005481648.novalocal sudo[100300]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100300]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100303]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-swift.conf Oct 12 14:53:22 np0005481648.novalocal sudo[100303]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100303]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100306]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Oct 12 14:53:22 np0005481648.novalocal sudo[100306]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100306]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100309]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./schema-image.json Oct 12 14:53:22 np0005481648.novalocal sudo[100309]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100309]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100312]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-iops-filter.json Oct 12 14:53:22 np0005481648.novalocal sudo[100312]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100312]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100315]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-processor-allocation-setting-data.json Oct 12 14:53:22 np0005481648.novalocal sudo[100315]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100315]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100318]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-resource-allocation-setting-data.json Oct 12 14:53:22 np0005481648.novalocal sudo[100318]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100318]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100321]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-storage-allocation-setting-data.json Oct 12 14:53:22 np0005481648.novalocal sudo[100321]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100321]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100324]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-virtual-system-setting-data.json Oct 12 14:53:22 np0005481648.novalocal sudo[100324]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100324]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100327]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-disk-filter.json Oct 12 14:53:22 np0005481648.novalocal sudo[100327]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100327]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100330]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-num-instances.json Oct 12 14:53:22 np0005481648.novalocal sudo[100330]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100330]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100333]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-cpu-mode.json Oct 12 14:53:22 np0005481648.novalocal sudo[100333]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100333]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100336]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-cpu-pinning.json Oct 12 14:53:22 np0005481648.novalocal sudo[100336]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100336]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100339]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-guest-memory-backing.json Oct 12 14:53:22 np0005481648.novalocal sudo[100339]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100339]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100342]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-guest-shutdown.json Oct 12 14:53:22 np0005481648.novalocal sudo[100342]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100342]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100345]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-host-capabilities.json Oct 12 14:53:22 np0005481648.novalocal sudo[100345]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100345]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100348]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-hypervisor.json Oct 12 14:53:22 np0005481648.novalocal sudo[100348]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100348]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100351]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-instance-data.json Oct 12 14:53:22 np0005481648.novalocal sudo[100351]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100351]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:22 np0005481648.novalocal sudo[100354]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-libvirt-image.json Oct 12 14:53:22 np0005481648.novalocal sudo[100354]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:22 np0005481648.novalocal sudo[100354]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100357]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-libvirt.json Oct 12 14:53:23 np0005481648.novalocal sudo[100357]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100357]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100360]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-quota.json Oct 12 14:53:23 np0005481648.novalocal sudo[100360]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100360]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100363]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-randomgen.json Oct 12 14:53:23 np0005481648.novalocal sudo[100363]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100363]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100366]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vcputopology.json Oct 12 14:53:23 np0005481648.novalocal sudo[100366]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100366]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100369]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware-flavor.json Oct 12 14:53:23 np0005481648.novalocal sudo[100369]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100369]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100372]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware-quota-flavor.json Oct 12 14:53:23 np0005481648.novalocal sudo[100372]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100372]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100375]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware.json Oct 12 14:53:23 np0005481648.novalocal sudo[100375]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100375]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100378]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vtpm-hw.json Oct 12 14:53:23 np0005481648.novalocal sudo[100378]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100378]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100381]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vtpm.json Oct 12 14:53:23 np0005481648.novalocal sudo[100381]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100381]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100384]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-watchdog.json Oct 12 14:53:23 np0005481648.novalocal sudo[100384]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100384]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100387]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-xenapi.json Oct 12 14:53:23 np0005481648.novalocal sudo[100387]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100387]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100390]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./glance-common-image-props.json Oct 12 14:53:23 np0005481648.novalocal sudo[100390]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100390]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100393]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./image-signature-verification.json Oct 12 14:53:23 np0005481648.novalocal sudo[100393]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100393]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100396]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./operating-system.json Oct 12 14:53:23 np0005481648.novalocal sudo[100396]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100396]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100399]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-databases.json Oct 12 14:53:23 np0005481648.novalocal sudo[100399]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100399]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100402]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-runtimes.json Oct 12 14:53:23 np0005481648.novalocal sudo[100402]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100402]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100405]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-webservers.json Oct 12 14:53:23 np0005481648.novalocal sudo[100405]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100405]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100408]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./storage-volume-type.json Oct 12 14:53:23 np0005481648.novalocal sudo[100408]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100408]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100411]: root : PWD=/var/log/weirdo-project/logs/etc/glance/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005481648.novalocal.pem Oct 12 14:53:23 np0005481648.novalocal sudo[100411]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100411]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100414]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./1 Oct 12 14:53:23 np0005481648.novalocal sudo[100414]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100414]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100417]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./0 Oct 12 14:53:23 np0005481648.novalocal sudo[100417]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100417]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100420]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/credential-keys ; USER=root ; COMMAND=/bin/chmod 644 ./1 Oct 12 14:53:23 np0005481648.novalocal sudo[100420]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100420]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100423]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/credential-keys ; USER=root ; COMMAND=/bin/chmod 644 ./0 Oct 12 14:53:23 np0005481648.novalocal sudo[100423]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100423]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100426]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.conf Oct 12 14:53:23 np0005481648.novalocal sudo[100426]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100426]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100429]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./logging.conf Oct 12 14:53:23 np0005481648.novalocal sudo[100429]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100429]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100432]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./sso_callback_template.html Oct 12 14:53:23 np0005481648.novalocal sudo[100432]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100432]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100435]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Oct 12 14:53:23 np0005481648.novalocal sudo[100435]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100435]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100438]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005481648.novalocal.pem Oct 12 14:53:23 np0005481648.novalocal sudo[100438]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100438]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100441]: root : PWD=/var/log/weirdo-project/logs/etc/manila/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005481648.novalocal.pem Oct 12 14:53:23 np0005481648.novalocal sudo[100441]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100441]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100444]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Oct 12 14:53:23 np0005481648.novalocal sudo[100444]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100444]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100447]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Oct 12 14:53:23 np0005481648.novalocal sudo[100447]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100447]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100450]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila.conf Oct 12 14:53:23 np0005481648.novalocal sudo[100450]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100450]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100453]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Oct 12 14:53:23 np0005481648.novalocal sudo[100453]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100453]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100456]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005481648.novalocal.pem Oct 12 14:53:23 np0005481648.novalocal sudo[100456]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100456]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100459]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Oct 12 14:53:23 np0005481648.novalocal sudo[100459]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100459]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100462]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Oct 12 14:53:23 np0005481648.novalocal sudo[100462]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100462]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100465]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Oct 12 14:53:23 np0005481648.novalocal sudo[100465]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:23 np0005481648.novalocal sudo[100465]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:23 np0005481648.novalocal sudo[100468]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Oct 12 14:53:23 np0005481648.novalocal sudo[100468]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:24 np0005481648.novalocal sudo[100468]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:24 np0005481648.novalocal sudo[100471]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./switchcacert.pem Oct 12 14:53:24 np0005481648.novalocal sudo[100471]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:24 np0005481648.novalocal sudo[100471]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:24 np0005481648.novalocal sudo[100474]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Oct 12 14:53:24 np0005481648.novalocal sudo[100474]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:24 np0005481648.novalocal sudo[100474]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:24 np0005481648.novalocal sudo[100477]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.conf Oct 12 14:53:24 np0005481648.novalocal sudo[100477]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:24 np0005481648.novalocal sudo[100477]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:24 np0005481648.novalocal sudo[100480]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Oct 12 14:53:24 np0005481648.novalocal sudo[100480]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:24 np0005481648.novalocal sudo[100480]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:24 np0005481648.novalocal sudo[100483]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Oct 12 14:53:24 np0005481648.novalocal sudo[100483]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:24 np0005481648.novalocal sudo[100483]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:24 np0005481648.novalocal sudo[100486]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./dhcp_agent.ini Oct 12 14:53:24 np0005481648.novalocal sudo[100486]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:24 np0005481648.novalocal sudo[100486]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:24 np0005481648.novalocal sudo[100489]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./l3_agent.ini Oct 12 14:53:24 np0005481648.novalocal sudo[100489]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:24 np0005481648.novalocal sudo[100489]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:24 np0005481648.novalocal sudo[100492]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./metadata_agent.ini Oct 12 14:53:24 np0005481648.novalocal sudo[100492]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:24 np0005481648.novalocal sudo[100492]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:24 np0005481648.novalocal sudo[100495]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovn_vpn_agent.ini Oct 12 14:53:24 np0005481648.novalocal sudo[100495]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:24 np0005481648.novalocal sudo[100495]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:24 np0005481648.novalocal sudo[100498]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_vpnaas.conf Oct 12 14:53:24 np0005481648.novalocal sudo[100498]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:24 np0005481648.novalocal sudo[100498]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:24 np0005481648.novalocal sudo[100501]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./vpn_agent.ini Oct 12 14:53:24 np0005481648.novalocal sudo[100501]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:24 np0005481648.novalocal sudo[100501]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:24 np0005481648.novalocal sudo[100504]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./README Oct 12 14:53:24 np0005481648.novalocal sudo[100504]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:24 np0005481648.novalocal sudo[100504]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:24 np0005481648.novalocal sudo[100507]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./ml2_conf.ini Oct 12 14:53:24 np0005481648.novalocal sudo[100507]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:24 np0005481648.novalocal sudo[100507]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:24 np0005481648.novalocal sudo[100510]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./ovn_agent.ini Oct 12 14:53:24 np0005481648.novalocal sudo[100510]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:24 np0005481648.novalocal sudo[100510]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:24 np0005481648.novalocal sudo[100513]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./sriov_agent.ini Oct 12 14:53:24 np0005481648.novalocal sudo[100513]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:24 np0005481648.novalocal sudo[100513]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:24 np0005481648.novalocal sudo[100516]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Oct 12 14:53:24 np0005481648.novalocal sudo[100516]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:24 np0005481648.novalocal sudo[100516]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:24 np0005481648.novalocal sudo[100519]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova.conf Oct 12 14:53:24 np0005481648.novalocal sudo[100519]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:24 np0005481648.novalocal sudo[100519]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:24 np0005481648.novalocal sudo[100522]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./release Oct 12 14:53:24 np0005481648.novalocal sudo[100522]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:24 np0005481648.novalocal sudo[100522]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:24 np0005481648.novalocal sudo[100525]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Oct 12 14:53:24 np0005481648.novalocal sudo[100525]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:24 np0005481648.novalocal sudo[100525]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:24 np0005481648.novalocal sudo[100528]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-compute.conf Oct 12 14:53:24 np0005481648.novalocal sudo[100528]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:24 np0005481648.novalocal sudo[100528]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:24 np0005481648.novalocal sudo[100531]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Oct 12 14:53:24 np0005481648.novalocal sudo[100531]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:24 np0005481648.novalocal sudo[100531]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:24 np0005481648.novalocal sudo[100534]: root : PWD=/var/log/weirdo-project/logs/etc/nova/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005481648.novalocal.pem Oct 12 14:53:24 np0005481648.novalocal sudo[100534]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:24 np0005481648.novalocal sudo[100534]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:24 np0005481648.novalocal sudo[100537]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Oct 12 14:53:24 np0005481648.novalocal sudo[100537]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:24 np0005481648.novalocal sudo[100537]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:24 np0005481648.novalocal sudo[100540]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./octavia.conf Oct 12 14:53:24 np0005481648.novalocal sudo[100540]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:24 np0005481648.novalocal sudo[100540]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:24 np0005481648.novalocal sudo[100543]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Oct 12 14:53:24 np0005481648.novalocal sudo[100543]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:24 np0005481648.novalocal sudo[100543]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:24 np0005481648.novalocal sudo[100546]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Oct 12 14:53:24 np0005481648.novalocal sudo[100546]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:24 np0005481648.novalocal sudo[100546]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:24 np0005481648.novalocal sudo[100549]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Oct 12 14:53:24 np0005481648.novalocal sudo[100549]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:24 np0005481648.novalocal sudo[100549]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:24 np0005481648.novalocal sudo[100552]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Oct 12 14:53:24 np0005481648.novalocal sudo[100552]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:24 np0005481648.novalocal sudo[100552]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:24 np0005481648.novalocal sudo[100555]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./switchcacert.pem Oct 12 14:53:24 np0005481648.novalocal sudo[100555]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:24 np0005481648.novalocal sudo[100555]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:24 np0005481648.novalocal sudo[100558]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./server_ca.cert.pem Oct 12 14:53:24 np0005481648.novalocal sudo[100558]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:24 np0005481648.novalocal sudo[100558]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:24 np0005481648.novalocal sudo[100561]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./server_ca.key.pem Oct 12 14:53:24 np0005481648.novalocal sudo[100561]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:24 np0005481648.novalocal sudo[100561]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:24 np0005481648.novalocal sudo[100564]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./client_ca.cert.pem Oct 12 14:53:24 np0005481648.novalocal sudo[100564]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:24 np0005481648.novalocal sudo[100564]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:24 np0005481648.novalocal sudo[100567]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./client.cert-and-key.pem Oct 12 14:53:24 np0005481648.novalocal sudo[100567]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:24 np0005481648.novalocal sudo[100567]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:25 np0005481648.novalocal sudo[100570]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005481648.novalocal.pem Oct 12 14:53:25 np0005481648.novalocal sudo[100570]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:25 np0005481648.novalocal sudo[100570]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:25 np0005481648.novalocal sudo[100573]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 644 ./placement.conf Oct 12 14:53:25 np0005481648.novalocal sudo[100573]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:25 np0005481648.novalocal sudo[100573]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:25 np0005481648.novalocal sudo[100576]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Oct 12 14:53:25 np0005481648.novalocal sudo[100576]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:25 np0005481648.novalocal sudo[100576]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:25 np0005481648.novalocal sudo[100579]: root : PWD=/var/log/weirdo-project/logs/etc/placement/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005481648.novalocal.pem Oct 12 14:53:25 np0005481648.novalocal sudo[100579]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:25 np0005481648.novalocal sudo[100579]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:25 np0005481648.novalocal sudo[100582]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./accounts.yaml.sample Oct 12 14:53:25 np0005481648.novalocal sudo[100582]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:25 np0005481648.novalocal sudo[100582]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:25 np0005481648.novalocal sudo[100585]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./allow-list.yaml Oct 12 14:53:25 np0005481648.novalocal sudo[100585]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:25 np0005481648.novalocal sudo[100585]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:25 np0005481648.novalocal sudo[100588]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./logging.conf.sample Oct 12 14:53:25 np0005481648.novalocal sudo[100588]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:25 np0005481648.novalocal sudo[100588]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:25 np0005481648.novalocal sudo[100591]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./rbac-persona-accounts.yaml.sample Oct 12 14:53:25 np0005481648.novalocal sudo[100591]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:25 np0005481648.novalocal sudo[100591]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:25 np0005481648.novalocal sudo[100594]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.conf Oct 12 14:53:25 np0005481648.novalocal sudo[100594]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:25 np0005481648.novalocal sudo[100594]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:25 np0005481648.novalocal sudo[100597]: root : PWD=/var/log/weirdo-project/logs/etc/rsyslog.d ; USER=root ; COMMAND=/bin/chmod 644 ./21-cloudinit.conf Oct 12 14:53:25 np0005481648.novalocal sudo[100597]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:25 np0005481648.novalocal sudo[100597]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:25 np0005481648.novalocal sudo[100600]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./rsyslog.conf Oct 12 14:53:25 np0005481648.novalocal sudo[100600]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:25 np0005481648.novalocal sudo[100600]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:25 np0005481648.novalocal sudo[100603]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005481648.novalocal.pem Oct 12 14:53:25 np0005481648.novalocal sudo[100603]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:25 np0005481648.novalocal sudo[100603]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:25 np0005481648.novalocal sudo[100606]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq.conf Oct 12 14:53:25 np0005481648.novalocal sudo[100606]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:25 np0005481648.novalocal sudo[100606]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:25 np0005481648.novalocal sudo[100609]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq.config Oct 12 14:53:25 np0005481648.novalocal sudo[100609]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:25 np0005481648.novalocal sudo[100609]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:25 np0005481648.novalocal sudo[100612]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq-env.conf Oct 12 14:53:25 np0005481648.novalocal sudo[100612]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:25 np0005481648.novalocal sudo[100612]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:25 np0005481648.novalocal sudo[100615]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./inetrc Oct 12 14:53:25 np0005481648.novalocal sudo[100615]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:25 np0005481648.novalocal sudo[100615]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:25 np0005481648.novalocal sudo[100618]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmqadmin.conf Oct 12 14:53:25 np0005481648.novalocal sudo[100618]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:25 np0005481648.novalocal sudo[100618]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:25 np0005481648.novalocal sudo[100621]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./enabled_plugins Oct 12 14:53:25 np0005481648.novalocal sudo[100621]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:25 np0005481648.novalocal sudo[100621]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:25 np0005481648.novalocal sudo[100624]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./my.cnf Oct 12 14:53:25 np0005481648.novalocal sudo[100624]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:25 np0005481648.novalocal sudo[100624]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:25 np0005481648.novalocal sudo[100627]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./auth_gssapi.cnf Oct 12 14:53:25 np0005481648.novalocal sudo[100627]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:25 np0005481648.novalocal sudo[100627]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:25 np0005481648.novalocal sudo[100630]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./enable_encryption.preset Oct 12 14:53:25 np0005481648.novalocal sudo[100630]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:25 np0005481648.novalocal sudo[100630]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:25 np0005481648.novalocal sudo[100633]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./mariadb-server.cnf Oct 12 14:53:25 np0005481648.novalocal sudo[100633]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:25 np0005481648.novalocal sudo[100633]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:25 np0005481648.novalocal sudo[100636]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./spider.cnf Oct 12 14:53:25 np0005481648.novalocal sudo[100636]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:25 np0005481648.novalocal sudo[100636]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:25 np0005481648.novalocal sudo[100639]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./mysql-clients.cnf Oct 12 14:53:25 np0005481648.novalocal sudo[100639]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:25 np0005481648.novalocal sudo[100639]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:25 np0005481648.novalocal sudo[100642]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./server.cnf Oct 12 14:53:25 np0005481648.novalocal sudo[100642]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:25 np0005481648.novalocal sudo[100642]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:25 np0005481648.novalocal sudo[100647]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./client.cnf Oct 12 14:53:25 np0005481648.novalocal sudo[100647]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:25 np0005481648.novalocal sudo[100647]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:25 np0005481648.novalocal sudo[100650]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./np0005481648.novalocal.pem Oct 12 14:53:25 np0005481648.novalocal sudo[100650]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:25 np0005481648.novalocal sudo[100650]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:25 np0005481648.novalocal sudo[100653]: root : PWD=/var/log/weirdo-project/logs/etc/iscsi ; USER=root ; COMMAND=/bin/chmod 644 ./iscsid.conf Oct 12 14:53:25 np0005481648.novalocal sudo[100653]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:25 np0005481648.novalocal sudo[100653]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:25 np0005481648.novalocal sudo[100656]: root : PWD=/var/log/weirdo-project/logs/etc/iscsi ; USER=root ; COMMAND=/bin/chmod 644 ./initiatorname.iscsi Oct 12 14:53:25 np0005481648.novalocal sudo[100656]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:25 np0005481648.novalocal sudo[100656]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:25 np0005481648.novalocal sudo[100659]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks ; USER=root ; COMMAND=/bin/chmod 644 ./default.xml Oct 12 14:53:25 np0005481648.novalocal sudo[100659]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:25 np0005481648.novalocal sudo[100659]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:25 np0005481648.novalocal sudo[100662]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./qemu.conf Oct 12 14:53:25 np0005481648.novalocal sudo[100662]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:25 np0005481648.novalocal sudo[100662]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:25 np0005481648.novalocal sudo[100665]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtqemud.conf Oct 12 14:53:25 np0005481648.novalocal sudo[100665]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:25 np0005481648.novalocal sudo[100665]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:25 np0005481648.novalocal sudo[100668]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtsecretd.conf Oct 12 14:53:25 np0005481648.novalocal sudo[100668]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:25 np0005481648.novalocal sudo[100668]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:25 np0005481648.novalocal sudo[100671]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt-admin.conf Oct 12 14:53:25 np0005481648.novalocal sudo[100671]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:25 np0005481648.novalocal sudo[100671]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:25 np0005481648.novalocal sudo[100674]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt.conf Oct 12 14:53:25 np0005481648.novalocal sudo[100674]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:25 np0005481648.novalocal sudo[100674]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:26 np0005481648.novalocal sudo[100677]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtlockd.conf Oct 12 14:53:26 np0005481648.novalocal sudo[100677]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:26 np0005481648.novalocal sudo[100677]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:26 np0005481648.novalocal sudo[100680]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtlogd.conf Oct 12 14:53:26 np0005481648.novalocal sudo[100680]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:26 np0005481648.novalocal sudo[100680]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:26 np0005481648.novalocal sudo[100683]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtproxyd.conf Oct 12 14:53:26 np0005481648.novalocal sudo[100683]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:26 np0005481648.novalocal sudo[100683]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:26 np0005481648.novalocal sudo[100686]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtstoraged.conf Oct 12 14:53:26 np0005481648.novalocal sudo[100686]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:26 np0005481648.novalocal sudo[100686]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:26 np0005481648.novalocal sudo[100689]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirtd.conf Oct 12 14:53:26 np0005481648.novalocal sudo[100689]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:26 np0005481648.novalocal sudo[100689]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:26 np0005481648.novalocal sudo[100692]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtinterfaced.conf Oct 12 14:53:26 np0005481648.novalocal sudo[100692]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:26 np0005481648.novalocal sudo[100692]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:26 np0005481648.novalocal sudo[100695]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./network.conf Oct 12 14:53:26 np0005481648.novalocal sudo[100695]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:26 np0005481648.novalocal sudo[100695]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:26 np0005481648.novalocal sudo[100698]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnetworkd.conf Oct 12 14:53:26 np0005481648.novalocal sudo[100698]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:26 np0005481648.novalocal sudo[100698]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:26 np0005481648.novalocal sudo[100701]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnodedevd.conf Oct 12 14:53:26 np0005481648.novalocal sudo[100701]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:26 np0005481648.novalocal sudo[100701]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:26 np0005481648.novalocal sudo[100704]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnwfilterd.conf Oct 12 14:53:26 np0005481648.novalocal sudo[100704]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:26 np0005481648.novalocal sudo[100704]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:26 np0005481648.novalocal sudo[100707]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./qemu-lockd.conf Oct 12 14:53:26 np0005481648.novalocal sudo[100707]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:26 np0005481648.novalocal sudo[100707]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:26 np0005481648.novalocal sudo[100710]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Oct 12 14:53:26 np0005481648.novalocal sudo[100710]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:26 np0005481648.novalocal sudo[100710]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:26 np0005481648.novalocal sudo[100713]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Oct 12 14:53:26 np0005481648.novalocal sudo[100713]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:26 np0005481648.novalocal sudo[100713]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:26 np0005481648.novalocal sudo[100716]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./default.conf Oct 12 14:53:26 np0005481648.novalocal sudo[100716]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:26 np0005481648.novalocal sudo[100716]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:26 np0005481648.novalocal sudo[100719]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./.conf.db.~lock~ Oct 12 14:53:26 np0005481648.novalocal sudo[100719]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:26 np0005481648.novalocal sudo[100719]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:26 np0005481648.novalocal sudo[100722]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./conf.db Oct 12 14:53:26 np0005481648.novalocal sudo[100722]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:26 np0005481648.novalocal sudo[100722]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:26 np0005481648.novalocal sudo[100725]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./system-id.conf Oct 12 14:53:26 np0005481648.novalocal sudo[100725]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:26 np0005481648.novalocal sudo[100725]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:26 np0005481648.novalocal sudo[100728]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-req.pem Oct 12 14:53:26 np0005481648.novalocal sudo[100728]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:26 np0005481648.novalocal sudo[100728]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:26 np0005481648.novalocal sudo[100731]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Oct 12 14:53:26 np0005481648.novalocal sudo[100731]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:26 np0005481648.novalocal sudo[100731]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:26 np0005481648.novalocal sudo[100734]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-req.pem Oct 12 14:53:26 np0005481648.novalocal sudo[100734]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:26 np0005481648.novalocal sudo[100734]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:26 np0005481648.novalocal sudo[100737]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Oct 12 14:53:26 np0005481648.novalocal sudo[100737]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:26 np0005481648.novalocal sudo[100737]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:26 np0005481648.novalocal sudo[100740]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-req.pem Oct 12 14:53:26 np0005481648.novalocal sudo[100740]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:26 np0005481648.novalocal sudo[100740]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:26 np0005481648.novalocal sudo[100743]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-cert.pem Oct 12 14:53:26 np0005481648.novalocal sudo[100743]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:26 np0005481648.novalocal sudo[100743]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:26 np0005481648.novalocal sudo[100746]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-privkey.pem Oct 12 14:53:26 np0005481648.novalocal sudo[100746]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:26 np0005481648.novalocal sudo[100746]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:26 np0005481648.novalocal sudo[100749]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./httpd.conf Oct 12 14:53:26 np0005481648.novalocal sudo[100749]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:26 np0005481648.novalocal sudo[100749]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:26 np0005481648.novalocal sudo[100752]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./magic Oct 12 14:53:26 np0005481648.novalocal sudo[100752]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:26 np0005481648.novalocal sudo[100752]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:26 np0005481648.novalocal sudo[100755]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./ports.conf Oct 12 14:53:26 np0005481648.novalocal sudo[100755]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:26 np0005481648.novalocal sudo[100755]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:26 np0005481648.novalocal sudo[100758]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-cinder_wsgi.conf Oct 12 14:53:26 np0005481648.novalocal sudo[100758]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:26 np0005481648.novalocal sudo[100758]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:26 np0005481648.novalocal sudo[100761]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-glance_wsgi.conf Oct 12 14:53:26 np0005481648.novalocal sudo[100761]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:26 np0005481648.novalocal sudo[100761]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:26 np0005481648.novalocal sudo[100764]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-keystone_wsgi.conf Oct 12 14:53:26 np0005481648.novalocal sudo[100764]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:26 np0005481648.novalocal sudo[100764]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:26 np0005481648.novalocal sudo[100767]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-manila_wsgi.conf Oct 12 14:53:26 np0005481648.novalocal sudo[100767]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:26 np0005481648.novalocal sudo[100767]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:27 np0005481648.novalocal sudo[100770]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-neutron_wsgi.conf Oct 12 14:53:27 np0005481648.novalocal sudo[100770]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:27 np0005481648.novalocal sudo[100770]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:27 np0005481648.novalocal sudo[100773]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-nova_api_wsgi.conf Oct 12 14:53:27 np0005481648.novalocal sudo[100773]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:27 np0005481648.novalocal sudo[100773]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:27 np0005481648.novalocal sudo[100776]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-nova_metadata_wsgi.conf Oct 12 14:53:27 np0005481648.novalocal sudo[100776]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:27 np0005481648.novalocal sudo[100776]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:27 np0005481648.novalocal sudo[100779]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-octavia_wsgi.conf Oct 12 14:53:27 np0005481648.novalocal sudo[100779]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:27 np0005481648.novalocal sudo[100779]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:27 np0005481648.novalocal sudo[100782]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-placement_wsgi.conf Oct 12 14:53:27 np0005481648.novalocal sudo[100782]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:27 np0005481648.novalocal sudo[100782]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:27 np0005481648.novalocal sudo[100785]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./15-horizon_ssl_vhost.conf Oct 12 14:53:27 np0005481648.novalocal sudo[100785]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:27 np0005481648.novalocal sudo[100785]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:27 np0005481648.novalocal sudo[100788]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./15-horizon_vhost.conf Oct 12 14:53:27 np0005481648.novalocal sudo[100788]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:27 np0005481648.novalocal sudo[100788]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:27 np0005481648.novalocal sudo[100791]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./openstack-dashboard.conf Oct 12 14:53:27 np0005481648.novalocal sudo[100791]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:27 np0005481648.novalocal sudo[100791]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:27 np0005481648.novalocal sudo[100794]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./alias.conf Oct 12 14:53:27 np0005481648.novalocal sudo[100794]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:27 np0005481648.novalocal sudo[100794]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:27 np0005481648.novalocal sudo[100797]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./alias.load Oct 12 14:53:27 np0005481648.novalocal sudo[100797]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:27 np0005481648.novalocal sudo[100797]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:27 np0005481648.novalocal sudo[100800]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_core.load Oct 12 14:53:27 np0005481648.novalocal sudo[100800]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:27 np0005481648.novalocal sudo[100800]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:27 np0005481648.novalocal sudo[100803]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_host.load Oct 12 14:53:27 np0005481648.novalocal sudo[100803]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:27 np0005481648.novalocal sudo[100803]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:27 np0005481648.novalocal sudo[100806]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./filter.load Oct 12 14:53:27 np0005481648.novalocal sudo[100806]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:27 np0005481648.novalocal sudo[100806]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:27 np0005481648.novalocal sudo[100809]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./log_config.load Oct 12 14:53:27 np0005481648.novalocal sudo[100809]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:27 np0005481648.novalocal sudo[100809]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:27 np0005481648.novalocal sudo[100812]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./mime.conf Oct 12 14:53:27 np0005481648.novalocal sudo[100812]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:27 np0005481648.novalocal sudo[100812]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:27 np0005481648.novalocal sudo[100815]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./mime.load Oct 12 14:53:27 np0005481648.novalocal sudo[100815]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:27 np0005481648.novalocal sudo[100815]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:27 np0005481648.novalocal sudo[100818]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./prefork.conf Oct 12 14:53:27 np0005481648.novalocal sudo[100818]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:27 np0005481648.novalocal sudo[100818]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:27 np0005481648.novalocal sudo[100821]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./prefork.load Oct 12 14:53:27 np0005481648.novalocal sudo[100821]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:27 np0005481648.novalocal sudo[100821]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:27 np0005481648.novalocal sudo[100824]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./setenvif.conf Oct 12 14:53:27 np0005481648.novalocal sudo[100824]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:27 np0005481648.novalocal sudo[100824]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:27 np0005481648.novalocal sudo[100827]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./setenvif.load Oct 12 14:53:27 np0005481648.novalocal sudo[100827]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:27 np0005481648.novalocal sudo[100827]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:27 np0005481648.novalocal sudo[100830]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./socache_shmcb.load Oct 12 14:53:27 np0005481648.novalocal sudo[100830]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:27 np0005481648.novalocal sudo[100830]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:27 np0005481648.novalocal sudo[100833]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./ssl.conf Oct 12 14:53:27 np0005481648.novalocal sudo[100833]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:27 np0005481648.novalocal sudo[100833]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:27 np0005481648.novalocal sudo[100836]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./ssl.load Oct 12 14:53:27 np0005481648.novalocal sudo[100836]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:27 np0005481648.novalocal sudo[100836]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:27 np0005481648.novalocal sudo[100839]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./systemd.load Oct 12 14:53:27 np0005481648.novalocal sudo[100839]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:27 np0005481648.novalocal sudo[100839]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:27 np0005481648.novalocal sudo[100842]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./unixd.load Oct 12 14:53:27 np0005481648.novalocal sudo[100842]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:27 np0005481648.novalocal sudo[100842]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:27 np0005481648.novalocal sudo[100845]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./wsgi.conf Oct 12 14:53:27 np0005481648.novalocal sudo[100845]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:27 np0005481648.novalocal sudo[100845]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:27 np0005481648.novalocal sudo[100848]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./wsgi.load Oct 12 14:53:27 np0005481648.novalocal sudo[100848]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:27 np0005481648.novalocal sudo[100848]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:27 np0005481648.novalocal sudo[100851]: root : PWD=/var/log/weirdo-project/logs/etc/redis/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005481648.novalocal.pem Oct 12 14:53:27 np0005481648.novalocal sudo[100851]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:27 np0005481648.novalocal sudo[100851]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:27 np0005481648.novalocal sudo[100854]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.conf Oct 12 14:53:27 np0005481648.novalocal sudo[100854]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:27 np0005481648.novalocal sudo[100854]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:27 np0005481648.novalocal sudo[100857]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.conf.puppet Oct 12 14:53:27 np0005481648.novalocal sudo[100857]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:27 np0005481648.novalocal sudo[100857]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:27 np0005481648.novalocal sudo[100860]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.conf.puppet Oct 12 14:53:27 np0005481648.novalocal sudo[100860]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:27 np0005481648.novalocal sudo[100860]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:27 np0005481648.novalocal sudo[100863]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.conf Oct 12 14:53:27 np0005481648.novalocal sudo[100863]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:27 np0005481648.novalocal sudo[100863]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:27 np0005481648.novalocal sudo[100866]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./.secret_key_store Oct 12 14:53:27 np0005481648.novalocal sudo[100866]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:27 np0005481648.novalocal sudo[100866]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:27 np0005481648.novalocal sudo[100869]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_policy.yaml.txt Oct 12 14:53:27 np0005481648.novalocal sudo[100869]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:27 np0005481648.novalocal sudo[100869]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100872]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./README.txt Oct 12 14:53:28 np0005481648.novalocal sudo[100872]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:28 np0005481648.novalocal sudo[100872]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100875]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.yaml Oct 12 14:53:28 np0005481648.novalocal sudo[100875]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:28 np0005481648.novalocal sudo[100875]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100878]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./glance.yaml Oct 12 14:53:28 np0005481648.novalocal sudo[100878]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:28 np0005481648.novalocal sudo[100878]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100881]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.yaml Oct 12 14:53:28 np0005481648.novalocal sudo[100881]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:28 np0005481648.novalocal sudo[100881]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100884]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.yaml Oct 12 14:53:28 np0005481648.novalocal sudo[100884]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:28 np0005481648.novalocal sudo[100884]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100887]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./nova.yaml Oct 12 14:53:28 np0005481648.novalocal sudo[100887]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:28 np0005481648.novalocal sudo[100887]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100890]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./manila.yaml Oct 12 14:53:28 np0005481648.novalocal sudo[100890]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:28 np0005481648.novalocal sudo[100890]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100893]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./glance_policy.yaml.txt Oct 12 14:53:28 np0005481648.novalocal sudo[100893]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:28 np0005481648.novalocal sudo[100893]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100896]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_policy.yaml.txt Oct 12 14:53:28 np0005481648.novalocal sudo[100896]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:28 np0005481648.novalocal sudo[100896]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100899]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./local_settings.txt Oct 12 14:53:28 np0005481648.novalocal sudo[100899]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:28 np0005481648.novalocal sudo[100899]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100902]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_10_set_custom_theme.py.example Oct 12 14:53:28 np0005481648.novalocal sudo[100902]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:28 np0005481648.novalocal sudo[100902]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100905]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_11_toggle_angular_features.py.example Oct 12 14:53:28 np0005481648.novalocal sudo[100905]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:28 np0005481648.novalocal sudo[100905]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100908]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_2010_integration_tests_deprecated.py.example Oct 12 14:53:28 np0005481648.novalocal sudo[100908]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:28 np0005481648.novalocal sudo[100908]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100911]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_20_integration_tests_scaffolds.py.example Oct 12 14:53:28 np0005481648.novalocal sudo[100911]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:28 np0005481648.novalocal sudo[100911]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100914]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_9030_profiler_settings.py.example Oct 12 14:53:28 np0005481648.novalocal sudo[100914]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:28 np0005481648.novalocal sudo[100914]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100917]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_90_manila_shares.py Oct 12 14:53:28 np0005481648.novalocal sudo[100917]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:28 np0005481648.novalocal sudo[100917]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100920]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./manila_policy.yaml.txt Oct 12 14:53:28 np0005481648.novalocal sudo[100920]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:28 np0005481648.novalocal sudo[100920]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100923]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_policy.yaml.txt Oct 12 14:53:28 np0005481648.novalocal sudo[100923]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:28 np0005481648.novalocal sudo[100923]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100926]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./api-extensions.yaml Oct 12 14:53:28 np0005481648.novalocal sudo[100926]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:28 np0005481648.novalocal sudo[100926]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100929]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./nova_policy.yaml.txt Oct 12 14:53:28 np0005481648.novalocal sudo[100929]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:28 np0005481648.novalocal sudo[100929]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100932]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005481648.novalocal.pem Oct 12 14:53:28 np0005481648.novalocal sudo[100932]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:28 np0005481648.novalocal sudo[100932]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100935]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./rsyncd.conf Oct 12 14:53:28 np0005481648.novalocal sudo[100935]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:28 np0005481648.novalocal sudo[100935]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100938]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./centos-addons.repo Oct 12 14:53:28 np0005481648.novalocal sudo[100938]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:28 np0005481648.novalocal sudo[100938]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100941]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./centos.repo Oct 12 14:53:28 np0005481648.novalocal sudo[100941]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:28 np0005481648.novalocal sudo[100941]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100944]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./delorean-deps.repo Oct 12 14:53:28 np0005481648.novalocal sudo[100944]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:28 np0005481648.novalocal sudo[100944]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100947]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./delorean.repo Oct 12 14:53:28 np0005481648.novalocal sudo[100947]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:28 np0005481648.novalocal sudo[100947]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100950]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./redhat.repo Oct 12 14:53:28 np0005481648.novalocal sudo[100950]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:28 np0005481648.novalocal sudo[100950]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100953]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./CentOS-Messaging-rabbitmq.repo Oct 12 14:53:28 np0005481648.novalocal sudo[100953]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:28 np0005481648.novalocal sudo[100953]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100956]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./passwd Oct 12 14:53:28 np0005481648.novalocal sudo[100956]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:28 np0005481648.novalocal sudo[100956]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100959]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./group Oct 12 14:53:28 np0005481648.novalocal sudo[100959]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:28 np0005481648.novalocal sudo[100959]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100962]: root : PWD=/var/log/weirdo-project/logs/etc/openstack/puppet ; USER=root ; COMMAND=/bin/chmod 644 ./admin-clouds.yaml Oct 12 14:53:28 np0005481648.novalocal sudo[100962]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:28 np0005481648.novalocal sudo[100962]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100965]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./fstab Oct 12 14:53:28 np0005481648.novalocal sudo[100965]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:28 np0005481648.novalocal sudo[100965]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100968]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder-manage.log Oct 12 14:53:28 np0005481648.novalocal sudo[100968]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:28 np0005481648.novalocal sudo[100968]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100971]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./scheduler.log Oct 12 14:53:28 np0005481648.novalocal sudo[100971]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:28 np0005481648.novalocal sudo[100971]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100974]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./volume.log Oct 12 14:53:28 np0005481648.novalocal sudo[100974]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:28 np0005481648.novalocal sudo[100974]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100977]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./backup.log Oct 12 14:53:28 np0005481648.novalocal sudo[100977]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:28 np0005481648.novalocal sudo[100977]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:28 np0005481648.novalocal sudo[100980]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder-api.log Oct 12 14:53:29 np0005481648.novalocal sudo[100980]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[100980]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[100983]: root : PWD=/var/log/weirdo-project/logs/glance ; USER=root ; COMMAND=/bin/chmod 644 ./api.log Oct 12 14:53:29 np0005481648.novalocal sudo[100983]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[100983]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[100986]: root : PWD=/var/log/weirdo-project/logs/glance ; USER=root ; COMMAND=/bin/chmod 644 ./cache.log Oct 12 14:53:29 np0005481648.novalocal sudo[100986]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[100986]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[100989]: root : PWD=/var/log/weirdo-project/logs/horizon ; USER=root ; COMMAND=/bin/chmod 644 ./horizon.log Oct 12 14:53:29 np0005481648.novalocal sudo[100989]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[100989]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[100992]: root : PWD=/var/log/weirdo-project/logs/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone-manage.log Oct 12 14:53:29 np0005481648.novalocal sudo[100992]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[100992]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[100995]: root : PWD=/var/log/weirdo-project/logs/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.log Oct 12 14:53:29 np0005481648.novalocal sudo[100995]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[100995]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[100998]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila-manage.log Oct 12 14:53:29 np0005481648.novalocal sudo[100998]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[100998]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[101001]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./scheduler.log Oct 12 14:53:29 np0005481648.novalocal sudo[101001]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[101001]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[101004]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./share.log Oct 12 14:53:29 np0005481648.novalocal sudo[101004]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[101004]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[101007]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./data.log Oct 12 14:53:29 np0005481648.novalocal sudo[101007]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[101007]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[101010]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Oct 12 14:53:29 np0005481648.novalocal sudo[101010]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[101010]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[101013]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila-api.log Oct 12 14:53:29 np0005481648.novalocal sudo[101013]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[101013]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[101016]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./rpc-server.log Oct 12 14:53:29 np0005481648.novalocal sudo[101016]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[101016]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[101019]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./periodic-workers.log Oct 12 14:53:29 np0005481648.novalocal sudo[101019]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[101019]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[101022]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron-ovn-agent.log Oct 12 14:53:29 np0005481648.novalocal sudo[101022]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[101022]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[101025]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./app.log Oct 12 14:53:29 np0005481648.novalocal sudo[101025]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[101025]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[101028]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-vpn-agent.log Oct 12 14:53:29 np0005481648.novalocal sudo[101028]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[101028]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[101031]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-maintenance-worker.log Oct 12 14:53:29 np0005481648.novalocal sudo[101031]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[101031]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[101034]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Oct 12 14:53:29 np0005481648.novalocal sudo[101034]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[101034]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[101037]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-manage.log Oct 12 14:53:29 np0005481648.novalocal sudo[101037]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[101037]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[101040]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-novncproxy.log Oct 12 14:53:29 np0005481648.novalocal sudo[101040]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[101040]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[101043]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-conductor.log Oct 12 14:53:29 np0005481648.novalocal sudo[101043]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[101043]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[101046]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-compute.log Oct 12 14:53:29 np0005481648.novalocal sudo[101046]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[101046]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[101049]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-scheduler.log Oct 12 14:53:29 np0005481648.novalocal sudo[101049]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[101049]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[101052]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-api.log Oct 12 14:53:29 np0005481648.novalocal sudo[101052]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[101052]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[101055]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Oct 12 14:53:29 np0005481648.novalocal sudo[101055]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[101055]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[101058]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-metadata-api.log Oct 12 14:53:29 np0005481648.novalocal sudo[101058]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[101058]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[101061]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./housekeeping.log Oct 12 14:53:29 np0005481648.novalocal sudo[101061]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[101061]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[101064]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./driver-agent.log Oct 12 14:53:29 np0005481648.novalocal sudo[101064]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[101064]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[101067]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./worker.log Oct 12 14:53:29 np0005481648.novalocal sudo[101067]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[101067]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[101070]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./app.log Oct 12 14:53:29 np0005481648.novalocal sudo[101070]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[101070]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[101073]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./health-manager.log Oct 12 14:53:29 np0005481648.novalocal sudo[101073]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[101073]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[101076]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server-nb.log Oct 12 14:53:29 np0005481648.novalocal sudo[101076]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[101076]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[101079]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-northd.log Oct 12 14:53:29 np0005481648.novalocal sudo[101079]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[101079]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[101082]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server-sb.log Oct 12 14:53:29 np0005481648.novalocal sudo[101082]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[101082]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[101085]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-controller.log Oct 12 14:53:29 np0005481648.novalocal sudo[101085]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[101085]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[101088]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_show.txt Oct 12 14:53:29 np0005481648.novalocal sudo[101088]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[101088]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[101091]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_get-connection.txt Oct 12 14:53:29 np0005481648.novalocal sudo[101091]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[101091]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[101094]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_get-ssl.txt Oct 12 14:53:29 np0005481648.novalocal sudo[101094]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[101094]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:29 np0005481648.novalocal sudo[101097]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_show.txt Oct 12 14:53:29 np0005481648.novalocal sudo[101097]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:29 np0005481648.novalocal sudo[101097]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101100]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_get-connection.txt Oct 12 14:53:30 np0005481648.novalocal sudo[101100]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101100]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101103]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_get-ssl.txt Oct 12 14:53:30 np0005481648.novalocal sudo[101103]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101103]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101106]: root : PWD=/var/log/weirdo-project/logs/placement ; USER=root ; COMMAND=/bin/chmod 644 ./placement.log Oct 12 14:53:30 np0005481648.novalocal sudo[101106]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101106]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101109]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet.conf Oct 12 14:53:30 np0005481648.novalocal sudo[101109]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101109]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101112]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./syslog.txt Oct 12 14:53:30 np0005481648.novalocal sudo[101112]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101112]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101115]: root : PWD=/var/log/weirdo-project/logs/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbit@localhost6_upgrade.log Oct 12 14:53:30 np0005481648.novalocal sudo[101115]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101115]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101118]: root : PWD=/var/log/weirdo-project/logs/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbit@localhost6.log Oct 12 14:53:30 np0005481648.novalocal sudo[101118]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101118]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101121]: root : PWD=/var/log/weirdo-project/logs/mariadb ; USER=root ; COMMAND=/bin/chmod 644 ./mariadb.log Oct 12 14:53:30 np0005481648.novalocal sudo[101121]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101121]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101124]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.log Oct 12 14:53:30 np0005481648.novalocal sudo[101124]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101124]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101127]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./testrepository.subunit Oct 12 14:53:30 np0005481648.novalocal sudo[101127]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101127]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101130]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./testr_results.html Oct 12 14:53:30 np0005481648.novalocal sudo[101130]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101130]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101133]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./dstat.log Oct 12 14:53:30 np0005481648.novalocal sudo[101133]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101133]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101136]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iostat.log Oct 12 14:53:30 np0005481648.novalocal sudo[101136]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101136]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101139]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iotop.log Oct 12 14:53:30 np0005481648.novalocal sudo[101139]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101139]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101142]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000002.log Oct 12 14:53:30 np0005481648.novalocal sudo[101142]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101142]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101145]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000001.log Oct 12 14:53:30 np0005481648.novalocal sudo[101145]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101145]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101148]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000003.log Oct 12 14:53:30 np0005481648.novalocal sudo[101148]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101148]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101151]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000004.log Oct 12 14:53:30 np0005481648.novalocal sudo[101151]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101151]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101154]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000005.log Oct 12 14:53:30 np0005481648.novalocal sudo[101154]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101154]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101157]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000006.log Oct 12 14:53:30 np0005481648.novalocal sudo[101157]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101157]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101160]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000007.log Oct 12 14:53:30 np0005481648.novalocal sudo[101160]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101160]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101163]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000008.log Oct 12 14:53:30 np0005481648.novalocal sudo[101163]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101163]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101166]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000009.log Oct 12 14:53:30 np0005481648.novalocal sudo[101166]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101166]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101169]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-0000000a.log Oct 12 14:53:30 np0005481648.novalocal sudo[101169]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101169]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101172]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-0000000b.log Oct 12 14:53:30 np0005481648.novalocal sudo[101172]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101172]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101175]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./virsh-net-list.txt Oct 12 14:53:30 np0005481648.novalocal sudo[101175]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101175]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101178]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server.log Oct 12 14:53:30 np0005481648.novalocal sudo[101178]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101178]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101181]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vswitchd.log Oct 12 14:53:30 np0005481648.novalocal sudo[101181]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101181]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101184]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-pki.log Oct 12 14:53:30 np0005481648.novalocal sudo[101184]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101184]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101187]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./zuul Oct 12 14:53:30 np0005481648.novalocal sudo[101187]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101187]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101190]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./90-cloud-init-users Oct 12 14:53:30 np0005481648.novalocal sudo[101190]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101190]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101193]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./glance Oct 12 14:53:30 np0005481648.novalocal sudo[101193]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101193]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101196]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./neutron Oct 12 14:53:30 np0005481648.novalocal sudo[101196]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101196]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101199]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./cinder Oct 12 14:53:30 np0005481648.novalocal sudo[101199]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101199]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101202]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./nova Oct 12 14:53:30 np0005481648.novalocal sudo[101202]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101202]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101205]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./manila Oct 12 14:53:30 np0005481648.novalocal sudo[101205]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101205]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101208]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./sudoers.txt Oct 12 14:53:30 np0005481648.novalocal sudo[101208]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:30 np0005481648.novalocal sudo[101208]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:30 np0005481648.novalocal sudo[101211]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./error_log Oct 12 14:53:31 np0005481648.novalocal sudo[101211]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:31 np0005481648.novalocal sudo[101211]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:31 np0005481648.novalocal sudo[101214]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_error.log Oct 12 14:53:31 np0005481648.novalocal sudo[101214]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:31 np0005481648.novalocal sudo[101214]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:31 np0005481648.novalocal sudo[101217]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_ssl_error.log Oct 12 14:53:31 np0005481648.novalocal sudo[101217]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:31 np0005481648.novalocal sudo[101217]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:31 np0005481648.novalocal sudo[101220]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./placement_wsgi_error_ssl.log Oct 12 14:53:31 np0005481648.novalocal sudo[101220]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:31 np0005481648.novalocal sudo[101220]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:31 np0005481648.novalocal sudo[101223]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./octavia_wsgi_error_ssl.log Oct 12 14:53:31 np0005481648.novalocal sudo[101223]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:31 np0005481648.novalocal sudo[101223]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:31 np0005481648.novalocal sudo[101226]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_metadata_wsgi_error_ssl.log Oct 12 14:53:31 np0005481648.novalocal sudo[101226]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:31 np0005481648.novalocal sudo[101226]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:31 np0005481648.novalocal sudo[101229]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_api_wsgi_error_ssl.log Oct 12 14:53:31 np0005481648.novalocal sudo[101229]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:31 np0005481648.novalocal sudo[101229]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:31 np0005481648.novalocal sudo[101232]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_wsgi_error_ssl.log Oct 12 14:53:31 np0005481648.novalocal sudo[101232]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:31 np0005481648.novalocal sudo[101232]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:31 np0005481648.novalocal sudo[101235]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./manila_wsgi_error_ssl.log Oct 12 14:53:31 np0005481648.novalocal sudo[101235]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:31 np0005481648.novalocal sudo[101235]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:31 np0005481648.novalocal sudo[101238]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_wsgi_error_ssl.log Oct 12 14:53:31 np0005481648.novalocal sudo[101238]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:31 np0005481648.novalocal sudo[101238]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:31 np0005481648.novalocal sudo[101241]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./glance_wsgi_error_ssl.log Oct 12 14:53:31 np0005481648.novalocal sudo[101241]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:31 np0005481648.novalocal sudo[101241]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:31 np0005481648.novalocal sudo[101244]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_wsgi_error_ssl.log Oct 12 14:53:31 np0005481648.novalocal sudo[101244]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:31 np0005481648.novalocal sudo[101244]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:31 np0005481648.novalocal sudo[101247]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_access.log Oct 12 14:53:31 np0005481648.novalocal sudo[101247]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:31 np0005481648.novalocal sudo[101247]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:31 np0005481648.novalocal sudo[101250]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_ssl_access.log Oct 12 14:53:31 np0005481648.novalocal sudo[101250]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:31 np0005481648.novalocal sudo[101250]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:31 np0005481648.novalocal sudo[101253]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./placement_wsgi_access_ssl.log Oct 12 14:53:31 np0005481648.novalocal sudo[101253]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:31 np0005481648.novalocal sudo[101253]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:31 np0005481648.novalocal sudo[101256]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./octavia_wsgi_access_ssl.log Oct 12 14:53:31 np0005481648.novalocal sudo[101256]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:31 np0005481648.novalocal sudo[101256]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:31 np0005481648.novalocal sudo[101259]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_metadata_wsgi_access_ssl.log Oct 12 14:53:31 np0005481648.novalocal sudo[101259]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:31 np0005481648.novalocal sudo[101259]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:31 np0005481648.novalocal sudo[101262]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_api_wsgi_access_ssl.log Oct 12 14:53:31 np0005481648.novalocal sudo[101262]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:31 np0005481648.novalocal sudo[101262]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:31 np0005481648.novalocal sudo[101265]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_wsgi_access_ssl.log Oct 12 14:53:31 np0005481648.novalocal sudo[101265]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:31 np0005481648.novalocal sudo[101265]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:31 np0005481648.novalocal sudo[101268]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./manila_wsgi_access_ssl.log Oct 12 14:53:31 np0005481648.novalocal sudo[101268]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:31 np0005481648.novalocal sudo[101268]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:31 np0005481648.novalocal sudo[101271]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_wsgi_access_ssl.log Oct 12 14:53:31 np0005481648.novalocal sudo[101271]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:31 np0005481648.novalocal sudo[101271]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:31 np0005481648.novalocal sudo[101274]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./glance_wsgi_access_ssl.log Oct 12 14:53:31 np0005481648.novalocal sudo[101274]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:31 np0005481648.novalocal sudo[101274]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:31 np0005481648.novalocal sudo[101277]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_wsgi_access_ssl.log Oct 12 14:53:31 np0005481648.novalocal sudo[101277]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:31 np0005481648.novalocal sudo[101277]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:31 np0005481648.novalocal sudo[101280]: root : PWD=/var/log/weirdo-project/logs/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.log Oct 12 14:53:31 np0005481648.novalocal sudo[101280]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:31 np0005481648.novalocal sudo[101280]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:31 np0005481648.novalocal sudo[101283]: root : PWD=/var/log/weirdo-project/logs/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.log Oct 12 14:53:31 np0005481648.novalocal sudo[101283]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:31 np0005481648.novalocal sudo[101283]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:31 np0005481648.novalocal sudo[101286]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./audit.log.txt Oct 12 14:53:31 np0005481648.novalocal sudo[101286]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:31 np0005481648.novalocal sudo[101286]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:31 np0005481648.novalocal sudo[101289]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./glance Oct 12 14:53:31 np0005481648.novalocal sudo[101289]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:31 np0005481648.novalocal sudo[101289]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:31 np0005481648.novalocal sudo[101292]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./cinder Oct 12 14:53:31 np0005481648.novalocal sudo[101292]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:31 np0005481648.novalocal sudo[101292]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:31 np0005481648.novalocal sudo[101295]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./manila Oct 12 14:53:31 np0005481648.novalocal sudo[101295]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:31 np0005481648.novalocal sudo[101295]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:31 np0005481648.novalocal sudo[101298]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./keystone Oct 12 14:53:31 np0005481648.novalocal sudo[101298]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:31 np0005481648.novalocal sudo[101298]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:31 np0005481648.novalocal sudo[101301]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./nova Oct 12 14:53:31 np0005481648.novalocal sudo[101301]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:31 np0005481648.novalocal sudo[101301]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:31 np0005481648.novalocal sudo[101304]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.conf.txt Oct 12 14:53:31 np0005481648.novalocal sudo[101304]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:31 np0005481648.novalocal sudo[101304]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:31 np0005481648.novalocal sudo[101307]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./rpm-qa.txt Oct 12 14:53:31 np0005481648.novalocal sudo[101307]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:31 np0005481648.novalocal sudo[101307]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:31 np0005481648.novalocal sudo[101310]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./repolist.txt Oct 12 14:53:31 np0005481648.novalocal sudo[101310]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:31 np0005481648.novalocal sudo[101310]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:31 np0005481648.novalocal sudo[101313]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./installed-packages.txt Oct 12 14:53:31 np0005481648.novalocal sudo[101313]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:31 np0005481648.novalocal sudo[101313]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:31 np0005481648.novalocal sudo[101316]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./modulelist.txt Oct 12 14:53:31 np0005481648.novalocal sudo[101316]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:32 np0005481648.novalocal sudo[101316]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:32 np0005481648.novalocal sudo[101319]: root : PWD=/var/log/weirdo-project/logs/dnf ; USER=root ; COMMAND=/bin/chmod 644 ./dnf.log Oct 12 14:53:32 np0005481648.novalocal sudo[101319]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:32 np0005481648.novalocal sudo[101319]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:32 np0005481648.novalocal sudo[101322]: root : PWD=/var/log/weirdo-project/logs/dnf ; USER=root ; COMMAND=/bin/chmod 644 ./dnf.rpm.log Oct 12 14:53:32 np0005481648.novalocal sudo[101322]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:32 np0005481648.novalocal sudo[101322]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:32 np0005481648.novalocal sudo[101325]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./gem-list.txt Oct 12 14:53:32 np0005481648.novalocal sudo[101325]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:32 np0005481648.novalocal sudo[101325]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:32 np0005481648.novalocal sudo[101328]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./df.txt Oct 12 14:53:32 np0005481648.novalocal sudo[101328]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:32 np0005481648.novalocal sudo[101328]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:32 np0005481648.novalocal sudo[101331]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./free.txt Oct 12 14:53:32 np0005481648.novalocal sudo[101331]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:32 np0005481648.novalocal sudo[101331]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:32 np0005481648.novalocal sudo[101334]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./lsmod.txt Oct 12 14:53:32 np0005481648.novalocal sudo[101334]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:32 np0005481648.novalocal sudo[101334]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:32 np0005481648.novalocal sudo[101337]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./cpuinfo.txt Oct 12 14:53:32 np0005481648.novalocal sudo[101337]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:32 np0005481648.novalocal sudo[101337]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:32 np0005481648.novalocal sudo[101340]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ps.txt Oct 12 14:53:32 np0005481648.novalocal sudo[101340]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:32 np0005481648.novalocal sudo[101340]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:32 np0005481648.novalocal sudo[101343]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ip_-d_address.txt Oct 12 14:53:32 np0005481648.novalocal sudo[101343]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:32 np0005481648.novalocal sudo[101343]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:32 np0005481648.novalocal sudo[101346]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./brctl_show.txt Oct 12 14:53:32 np0005481648.novalocal sudo[101346]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:32 np0005481648.novalocal sudo[101346]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:32 np0005481648.novalocal sudo[101349]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vsctl.txt Oct 12 14:53:32 np0005481648.novalocal sudo[101349]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:32 np0005481648.novalocal sudo[101349]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:32 np0005481648.novalocal sudo[101352]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl.txt Oct 12 14:53:32 np0005481648.novalocal sudo[101352]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:32 np0005481648.novalocal sudo[101352]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:32 np0005481648.novalocal sudo[101355]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl.txt Oct 12 14:53:32 np0005481648.novalocal sudo[101355]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:32 np0005481648.novalocal sudo[101355]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:32 np0005481648.novalocal sudo[101358]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./netstat.txt Oct 12 14:53:32 np0005481648.novalocal sudo[101358]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:32 np0005481648.novalocal sudo[101358]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:32 np0005481648.novalocal sudo[101361]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./systemctl.txt Oct 12 14:53:32 np0005481648.novalocal sudo[101361]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:32 np0005481648.novalocal sudo[101361]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:32 np0005481648.novalocal sudo[101364]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iptables.txt Oct 12 14:53:32 np0005481648.novalocal sudo[101364]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:32 np0005481648.novalocal sudo[101364]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:32 np0005481648.novalocal sudo[101367]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./mount.txt Oct 12 14:53:32 np0005481648.novalocal sudo[101367]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:32 np0005481648.novalocal sudo[101367]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:32 np0005481648.novalocal sudo[101370]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./losetup_-al.txt Oct 12 14:53:32 np0005481648.novalocal sudo[101370]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:32 np0005481648.novalocal sudo[101370]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:32 np0005481648.novalocal sudo[101373]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./lvm.txt Oct 12 14:53:32 np0005481648.novalocal sudo[101373]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:32 np0005481648.novalocal sudo[101373]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:32 np0005481648.novalocal sudo[101376]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./semanage-boolean-list.txt Oct 12 14:53:32 np0005481648.novalocal sudo[101376]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:32 np0005481648.novalocal sudo[101376]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:32 np0005481648.novalocal sudo[101379]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.txt Oct 12 14:53:32 np0005481648.novalocal sudo[101379]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:32 np0005481648.novalocal sudo[101379]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:32 np0005481648.novalocal sudo[101382]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./nova.txt Oct 12 14:53:32 np0005481648.novalocal sudo[101382]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:32 np0005481648.novalocal sudo[101382]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:32 np0005481648.novalocal sudo[101385]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./placement.txt Oct 12 14:53:32 np0005481648.novalocal sudo[101385]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:32 np0005481648.novalocal sudo[101385]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:32 np0005481648.novalocal sudo[101388]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.txt Oct 12 14:53:32 np0005481648.novalocal sudo[101388]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:32 np0005481648.novalocal sudo[101388]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:32 np0005481648.novalocal sudo[101391]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./glance.txt Oct 12 14:53:32 np0005481648.novalocal sudo[101391]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:32 np0005481648.novalocal sudo[101391]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:32 np0005481648.novalocal sudo[101394]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.txt Oct 12 14:53:32 np0005481648.novalocal sudo[101394]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:32 np0005481648.novalocal sudo[101394]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:32 np0005481648.novalocal sudo[101397]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./manila.txt Oct 12 14:53:32 np0005481648.novalocal sudo[101397]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:32 np0005481648.novalocal sudo[101397]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:33 np0005481648.novalocal sudo[101400]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./octavia.txt Oct 12 14:53:33 np0005481648.novalocal sudo[101400]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:33 np0005481648.novalocal sudo[101400]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:33 np0005481648.novalocal sudo[101403]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./nova-cell_v2.txt Oct 12 14:53:33 np0005481648.novalocal sudo[101403]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:33 np0005481648.novalocal sudo[101403]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:33 np0005481648.novalocal sudo[100180]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:33 np0005481648.novalocal sudo[101408]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/chown -R 0:0 /var/log/weirdo-project/logs Oct 12 14:53:33 np0005481648.novalocal sudo[101408]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:33 np0005481648.novalocal sudo[101408]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:33 np0005481648.novalocal sudo[101411]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type l -execdir sudo rm -f {} ; Oct 12 14:53:33 np0005481648.novalocal sudo[101411]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:33 np0005481648.novalocal sudo[101414]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./os-brick.filters Oct 12 14:53:33 np0005481648.novalocal sudo[101414]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:33 np0005481648.novalocal sudo[101414]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:33 np0005481648.novalocal sudo[101417]: root : PWD=/var/log/weirdo-project/logs/etc/glance/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./glance_cinder_store.filters Oct 12 14:53:33 np0005481648.novalocal sudo[101417]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:33 np0005481648.novalocal sudo[101417]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:33 np0005481648.novalocal sudo[101420]: root : PWD=/var/log/weirdo-project/logs/etc/glance/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./os-brick.filters Oct 12 14:53:33 np0005481648.novalocal sudo[101420]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:33 np0005481648.novalocal sudo[101420]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:33 np0005481648.novalocal sudo[101423]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/rm -f ./ovn.ini Oct 12 14:53:33 np0005481648.novalocal sudo[101423]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:33 np0005481648.novalocal sudo[101423]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:33 np0005481648.novalocal sudo[101426]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/rm -f ./plugin.ini Oct 12 14:53:33 np0005481648.novalocal sudo[101426]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:33 np0005481648.novalocal sudo[101426]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:33 np0005481648.novalocal sudo[101429]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/networking-ovn ; USER=root ; COMMAND=/bin/rm -f ./networking-ovn.ini Oct 12 14:53:33 np0005481648.novalocal sudo[101429]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:33 np0005481648.novalocal sudo[101429]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:33 np0005481648.novalocal sudo[101432]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks/autostart ; USER=root ; COMMAND=/bin/rm -f ./default.xml Oct 12 14:53:33 np0005481648.novalocal sudo[101432]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:33 np0005481648.novalocal sudo[101432]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:33 np0005481648.novalocal sudo[101435]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9085_manila_admin_add_share_group_snapshots_panel_to_share_panel_group.py Oct 12 14:53:33 np0005481648.novalocal sudo[101435]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:33 np0005481648.novalocal sudo[101435]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:33 np0005481648.novalocal sudo[101438]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9085_manila_project_add_share_group_snapshots_panel_to_share_panel_group.py Oct 12 14:53:33 np0005481648.novalocal sudo[101438]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:33 np0005481648.novalocal sudo[101438]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:33 np0005481648.novalocal sudo[101441]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9090_manila_admin_add_share_group_types_panel_to_share_panel_group.py Oct 12 14:53:33 np0005481648.novalocal sudo[101441]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:33 np0005481648.novalocal sudo[101441]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:33 np0005481648.novalocal sudo[101444]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9095_manila_admin_add_user_messages_panel_to_share_panel_group.py Oct 12 14:53:33 np0005481648.novalocal sudo[101444]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:33 np0005481648.novalocal sudo[101444]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:33 np0005481648.novalocal sudo[101447]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9095_manila_project_add_user_messages_panel_to_share_panel_group.py Oct 12 14:53:33 np0005481648.novalocal sudo[101447]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:33 np0005481648.novalocal sudo[101447]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:33 np0005481648.novalocal sudo[101450]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_80_manila_admin_add_share_panel_group.py Oct 12 14:53:33 np0005481648.novalocal sudo[101450]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:33 np0005481648.novalocal sudo[101450]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:33 np0005481648.novalocal sudo[101453]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_80_manila_project_add_share_panel_group.py Oct 12 14:53:33 np0005481648.novalocal sudo[101453]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:33 np0005481648.novalocal sudo[101453]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:33 np0005481648.novalocal sudo[101456]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9010_manila_admin_add_shares_panel_to_share_panel_group.py Oct 12 14:53:33 np0005481648.novalocal sudo[101456]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:33 np0005481648.novalocal sudo[101456]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:33 np0005481648.novalocal sudo[101459]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9010_manila_project_add_shares_panel_to_share_panel_group.py Oct 12 14:53:33 np0005481648.novalocal sudo[101459]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:33 np0005481648.novalocal sudo[101459]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:33 np0005481648.novalocal sudo[101462]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9020_manila_admin_add_share_snapshots_panel_to_share_panel_group.py Oct 12 14:53:33 np0005481648.novalocal sudo[101462]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:33 np0005481648.novalocal sudo[101462]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:33 np0005481648.novalocal sudo[101465]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9020_manila_project_add_share_snapshots_panel_to_share_panel_group.py Oct 12 14:53:33 np0005481648.novalocal sudo[101465]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:33 np0005481648.novalocal sudo[101465]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:33 np0005481648.novalocal sudo[101468]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9030_manila_admin_add_share_types_panel_to_share_panel_group.py Oct 12 14:53:33 np0005481648.novalocal sudo[101468]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:33 np0005481648.novalocal sudo[101468]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:33 np0005481648.novalocal sudo[101471]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9040_manila_admin_add_share_networks_panel_to_share_panel_group.py Oct 12 14:53:33 np0005481648.novalocal sudo[101471]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:33 np0005481648.novalocal sudo[101471]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:33 np0005481648.novalocal sudo[101474]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9040_manila_project_add_share_networks_panel_to_share_panel_group.py Oct 12 14:53:33 np0005481648.novalocal sudo[101474]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:33 np0005481648.novalocal sudo[101474]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:33 np0005481648.novalocal sudo[101477]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9050_manila_admin_add_security_services_panel_to_share_panel_group.py Oct 12 14:53:33 np0005481648.novalocal sudo[101477]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:33 np0005481648.novalocal sudo[101477]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:33 np0005481648.novalocal sudo[101480]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9050_manila_project_add_security_services_panel_to_share_panel_group.py Oct 12 14:53:33 np0005481648.novalocal sudo[101480]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:33 np0005481648.novalocal sudo[101480]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:33 np0005481648.novalocal sudo[101483]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9060_manila_admin_add_share_servers_panel_to_share_panel_group.py Oct 12 14:53:33 np0005481648.novalocal sudo[101483]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:33 np0005481648.novalocal sudo[101483]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:33 np0005481648.novalocal sudo[101486]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9070_manila_admin_add_share_instances_panel_to_share_panel_group.py Oct 12 14:53:33 np0005481648.novalocal sudo[101486]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:33 np0005481648.novalocal sudo[101486]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:34 np0005481648.novalocal sudo[101489]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9080_manila_admin_add_share_groups_panel_to_share_panel_group.py Oct 12 14:53:34 np0005481648.novalocal sudo[101489]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:34 np0005481648.novalocal sudo[101489]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:34 np0005481648.novalocal sudo[101492]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9080_manila_project_add_share_groups_panel_to_share_panel_group.py Oct 12 14:53:34 np0005481648.novalocal sudo[101492]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:34 np0005481648.novalocal sudo[101492]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:34 np0005481648.novalocal sudo[101411]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:34 np0005481648.novalocal sudo[101496]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/puppet-20251012_143630.log /var/log/weirdo-project/logs/puppet-20251012_143630.txt Oct 12 14:53:34 np0005481648.novalocal sudo[101496]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:34 np0005481648.novalocal sudo[101496]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:34 np0005481648.novalocal sudo[101499]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/puppet-20251012_143932.log /var/log/weirdo-project/logs/puppet-20251012_143932.txt Oct 12 14:53:34 np0005481648.novalocal sudo[101499]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:34 np0005481648.novalocal sudo[101499]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:34 np0005481648.novalocal sudo[101502]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/cinder-manage.log /var/log/weirdo-project/logs/cinder/cinder-manage.txt Oct 12 14:53:34 np0005481648.novalocal sudo[101502]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:34 np0005481648.novalocal sudo[101502]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:34 np0005481648.novalocal sudo[101505]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/scheduler.log /var/log/weirdo-project/logs/cinder/scheduler.txt Oct 12 14:53:34 np0005481648.novalocal sudo[101505]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:34 np0005481648.novalocal sudo[101505]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:34 np0005481648.novalocal sudo[101508]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/volume.log /var/log/weirdo-project/logs/cinder/volume.txt Oct 12 14:53:34 np0005481648.novalocal sudo[101508]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:34 np0005481648.novalocal sudo[101508]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:34 np0005481648.novalocal sudo[101511]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/backup.log /var/log/weirdo-project/logs/cinder/backup.txt Oct 12 14:53:34 np0005481648.novalocal sudo[101511]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:34 np0005481648.novalocal sudo[101511]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:34 np0005481648.novalocal sudo[101514]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/cinder-api.log /var/log/weirdo-project/logs/cinder/cinder-api.txt Oct 12 14:53:34 np0005481648.novalocal sudo[101514]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:34 np0005481648.novalocal sudo[101514]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:34 np0005481648.novalocal sudo[101517]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/glance/api.log /var/log/weirdo-project/logs/glance/api.txt Oct 12 14:53:34 np0005481648.novalocal sudo[101517]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:34 np0005481648.novalocal sudo[101517]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:34 np0005481648.novalocal sudo[101520]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/glance/cache.log /var/log/weirdo-project/logs/glance/cache.txt Oct 12 14:53:34 np0005481648.novalocal sudo[101520]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:34 np0005481648.novalocal sudo[101520]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:34 np0005481648.novalocal sudo[101523]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/horizon/horizon.log /var/log/weirdo-project/logs/horizon/horizon.txt Oct 12 14:53:34 np0005481648.novalocal sudo[101523]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:34 np0005481648.novalocal sudo[101523]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:34 np0005481648.novalocal sudo[101526]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/keystone/keystone-manage.log /var/log/weirdo-project/logs/keystone/keystone-manage.txt Oct 12 14:53:34 np0005481648.novalocal sudo[101526]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:34 np0005481648.novalocal sudo[101526]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:34 np0005481648.novalocal sudo[101529]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/keystone/keystone.log /var/log/weirdo-project/logs/keystone/keystone.txt Oct 12 14:53:34 np0005481648.novalocal sudo[101529]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:34 np0005481648.novalocal sudo[101529]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:34 np0005481648.novalocal sudo[101532]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/manila-manage.log /var/log/weirdo-project/logs/manila/manila-manage.txt Oct 12 14:53:34 np0005481648.novalocal sudo[101532]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:34 np0005481648.novalocal sudo[101532]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:34 np0005481648.novalocal sudo[101535]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/scheduler.log /var/log/weirdo-project/logs/manila/scheduler.txt Oct 12 14:53:34 np0005481648.novalocal sudo[101535]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:34 np0005481648.novalocal sudo[101535]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:34 np0005481648.novalocal sudo[101538]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/share.log /var/log/weirdo-project/logs/manila/share.txt Oct 12 14:53:34 np0005481648.novalocal sudo[101538]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:34 np0005481648.novalocal sudo[101538]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:34 np0005481648.novalocal sudo[101541]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/data.log /var/log/weirdo-project/logs/manila/data.txt Oct 12 14:53:34 np0005481648.novalocal sudo[101541]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:34 np0005481648.novalocal sudo[101541]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:34 np0005481648.novalocal sudo[101544]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/privsep-helper.log /var/log/weirdo-project/logs/manila/privsep-helper.txt Oct 12 14:53:34 np0005481648.novalocal sudo[101544]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:34 np0005481648.novalocal sudo[101544]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:34 np0005481648.novalocal sudo[101547]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/manila-api.log /var/log/weirdo-project/logs/manila/manila-api.txt Oct 12 14:53:34 np0005481648.novalocal sudo[101547]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:34 np0005481648.novalocal sudo[101547]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:34 np0005481648.novalocal sudo[101550]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/rpc-server.log /var/log/weirdo-project/logs/neutron/rpc-server.txt Oct 12 14:53:34 np0005481648.novalocal sudo[101550]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:34 np0005481648.novalocal sudo[101550]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:34 np0005481648.novalocal sudo[101553]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/periodic-workers.log /var/log/weirdo-project/logs/neutron/periodic-workers.txt Oct 12 14:53:34 np0005481648.novalocal sudo[101553]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:34 np0005481648.novalocal sudo[101553]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:34 np0005481648.novalocal sudo[101556]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/neutron-ovn-agent.log /var/log/weirdo-project/logs/neutron/neutron-ovn-agent.txt Oct 12 14:53:34 np0005481648.novalocal sudo[101556]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:34 np0005481648.novalocal sudo[101556]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:34 np0005481648.novalocal sudo[101559]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/app.log /var/log/weirdo-project/logs/neutron/app.txt Oct 12 14:53:34 np0005481648.novalocal sudo[101559]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:34 np0005481648.novalocal sudo[101559]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:34 np0005481648.novalocal sudo[101562]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/ovn-vpn-agent.log /var/log/weirdo-project/logs/neutron/ovn-vpn-agent.txt Oct 12 14:53:34 np0005481648.novalocal sudo[101562]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:34 np0005481648.novalocal sudo[101562]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:34 np0005481648.novalocal sudo[101565]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/ovn-maintenance-worker.log /var/log/weirdo-project/logs/neutron/ovn-maintenance-worker.txt Oct 12 14:53:34 np0005481648.novalocal sudo[101565]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:34 np0005481648.novalocal sudo[101565]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:34 np0005481648.novalocal sudo[101568]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/privsep-helper.log /var/log/weirdo-project/logs/neutron/privsep-helper.txt Oct 12 14:53:34 np0005481648.novalocal sudo[101568]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:34 np0005481648.novalocal sudo[101568]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:34 np0005481648.novalocal sudo[101571]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-manage.log /var/log/weirdo-project/logs/nova/nova-manage.txt Oct 12 14:53:34 np0005481648.novalocal sudo[101571]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:34 np0005481648.novalocal sudo[101571]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:34 np0005481648.novalocal sudo[101574]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-novncproxy.log /var/log/weirdo-project/logs/nova/nova-novncproxy.txt Oct 12 14:53:34 np0005481648.novalocal sudo[101574]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:34 np0005481648.novalocal sudo[101574]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal sudo[101577]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-conductor.log /var/log/weirdo-project/logs/nova/nova-conductor.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101577]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101577]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal sudo[101580]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-compute.log /var/log/weirdo-project/logs/nova/nova-compute.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101580]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101580]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal sudo[101583]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-scheduler.log /var/log/weirdo-project/logs/nova/nova-scheduler.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101583]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101583]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal sudo[101586]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-api.log /var/log/weirdo-project/logs/nova/nova-api.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101586]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101586]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal sudo[101589]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/privsep-helper.log /var/log/weirdo-project/logs/nova/privsep-helper.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101589]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101589]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal sudo[101592]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-metadata-api.log /var/log/weirdo-project/logs/nova/nova-metadata-api.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101592]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101592]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal sudo[101595]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/housekeeping.log /var/log/weirdo-project/logs/octavia/housekeeping.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101595]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101595]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal sudo[101598]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/driver-agent.log /var/log/weirdo-project/logs/octavia/driver-agent.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101598]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101598]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal sudo[101601]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/worker.log /var/log/weirdo-project/logs/octavia/worker.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101601]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101601]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal sudo[101604]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/app.log /var/log/weirdo-project/logs/octavia/app.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101604]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101604]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal sudo[101607]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/health-manager.log /var/log/weirdo-project/logs/octavia/health-manager.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101607]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101607]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal sudo[101610]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovsdb-server-nb.log /var/log/weirdo-project/logs/ovn/ovsdb-server-nb.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101610]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101610]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal sudo[101613]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovn-northd.log /var/log/weirdo-project/logs/ovn/ovn-northd.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101613]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101613]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal sudo[101616]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovsdb-server-sb.log /var/log/weirdo-project/logs/ovn/ovsdb-server-sb.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101616]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101616]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal sudo[101619]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovn-controller.log /var/log/weirdo-project/logs/ovn/ovn-controller.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101619]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101619]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal sudo[101622]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/placement/placement.log /var/log/weirdo-project/logs/placement/placement.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101622]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101622]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal sudo[101623]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Oct 12 14:53:35 np0005481648.novalocal systemd[1]: Started Session c304 of User root. Oct 12 14:53:35 np0005481648.novalocal sudo[101627]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6_upgrade.log /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6_upgrade.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101623]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:53:35 np0005481648.novalocal sudo[101627]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101627]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal sudo[101631]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6.log /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101631]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101631]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal sudo[101634]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/mariadb/mariadb.log /var/log/weirdo-project/logs/mariadb/mariadb.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101634]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101634]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal sudo[101637]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/tempest.log /var/log/weirdo-project/logs/tempest.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101637]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101637]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal sudo[101640]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dstat.log /var/log/weirdo-project/logs/dstat.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101640]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101640]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal sudo[101643]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/iostat.log /var/log/weirdo-project/logs/iostat.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101643]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101643]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal sudo[101646]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/iotop.log /var/log/weirdo-project/logs/iotop.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101646]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101646]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal sudo[101649]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000002.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000002.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101649]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101649]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal sudo[101652]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000001.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000001.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101652]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101652]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal sudo[101656]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000003.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000003.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101656]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101656]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal sudo[101659]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000004.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000004.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101659]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101659]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal sudo[101664]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000005.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000005.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101664]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101664]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal sudo[101623]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal systemd[1]: session-c304.scope: Deactivated successfully. Oct 12 14:53:35 np0005481648.novalocal sudo[101667]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000006.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000006.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101667]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101667]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal sudo[101669]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:53:35 np0005481648.novalocal sudo[101671]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000007.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000007.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101671]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101671]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal systemd[1]: Started Session c305 of User root. Oct 12 14:53:35 np0005481648.novalocal sudo[101669]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:53:35 np0005481648.novalocal sudo[101675]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000008.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000008.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101675]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101675]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal sudo[101679]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000009.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000009.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101679]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101679]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal sudo[101682]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-0000000a.log /var/log/weirdo-project/logs/libvirt/qemu/instance-0000000a.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101682]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101682]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal sudo[101685]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-0000000b.log /var/log/weirdo-project/logs/libvirt/qemu/instance-0000000b.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101685]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101685]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal sudo[101688]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovsdb-server.log /var/log/weirdo-project/logs/openvswitch/ovsdb-server.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101688]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101688]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal sudo[101691]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovs-vswitchd.log /var/log/weirdo-project/logs/openvswitch/ovs-vswitchd.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101691]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101691]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:35 np0005481648.novalocal sudo[101694]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovs-pki.log /var/log/weirdo-project/logs/openvswitch/ovs-pki.txt Oct 12 14:53:35 np0005481648.novalocal sudo[101694]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:35 np0005481648.novalocal sudo[101694]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal sudo[101697]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_error.log /var/log/weirdo-project/logs/apache/horizon_error.txt Oct 12 14:53:36 np0005481648.novalocal sudo[101697]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101697]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal sudo[101700]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_ssl_error.log /var/log/weirdo-project/logs/apache/horizon_ssl_error.txt Oct 12 14:53:36 np0005481648.novalocal sudo[101700]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101700]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal sudo[101703]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/placement_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/placement_wsgi_error_ssl.txt Oct 12 14:53:36 np0005481648.novalocal sudo[101703]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101703]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal sudo[101707]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/octavia_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/octavia_wsgi_error_ssl.txt Oct 12 14:53:36 np0005481648.novalocal sudo[101707]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101707]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal sudo[101710]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_error_ssl.txt Oct 12 14:53:36 np0005481648.novalocal sudo[101710]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101710]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal sudo[101713]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_api_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/nova_api_wsgi_error_ssl.txt Oct 12 14:53:36 np0005481648.novalocal sudo[101713]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101713]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal sudo[101669]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal systemd[1]: session-c305.scope: Deactivated successfully. Oct 12 14:53:36 np0005481648.novalocal sudo[101716]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/neutron_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/neutron_wsgi_error_ssl.txt Oct 12 14:53:36 np0005481648.novalocal sudo[101716]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101716]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal sudo[101718]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Oct 12 14:53:36 np0005481648.novalocal sudo[101720]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/manila_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/manila_wsgi_error_ssl.txt Oct 12 14:53:36 np0005481648.novalocal systemd[1]: Started Session c306 of User root. Oct 12 14:53:36 np0005481648.novalocal sudo[101718]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:53:36 np0005481648.novalocal sudo[101720]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101720]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal sudo[101725]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/keystone_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/keystone_wsgi_error_ssl.txt Oct 12 14:53:36 np0005481648.novalocal sudo[101725]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101725]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal sudo[101728]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/glance_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/glance_wsgi_error_ssl.txt Oct 12 14:53:36 np0005481648.novalocal sudo[101728]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101728]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal sudo[101731]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/cinder_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/cinder_wsgi_error_ssl.txt Oct 12 14:53:36 np0005481648.novalocal sudo[101731]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101731]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal sudo[101734]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_access.log /var/log/weirdo-project/logs/apache/horizon_access.txt Oct 12 14:53:36 np0005481648.novalocal sudo[101734]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101734]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal sudo[101737]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_ssl_access.log /var/log/weirdo-project/logs/apache/horizon_ssl_access.txt Oct 12 14:53:36 np0005481648.novalocal sudo[101737]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101737]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal sudo[101740]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/placement_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/placement_wsgi_access_ssl.txt Oct 12 14:53:36 np0005481648.novalocal sudo[101740]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101740]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal sudo[101743]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/octavia_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/octavia_wsgi_access_ssl.txt Oct 12 14:53:36 np0005481648.novalocal sudo[101743]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101743]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal sudo[101746]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_access_ssl.txt Oct 12 14:53:36 np0005481648.novalocal sudo[101746]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101746]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal sudo[101750]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_api_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/nova_api_wsgi_access_ssl.txt Oct 12 14:53:36 np0005481648.novalocal sudo[101750]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101750]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal sudo[101753]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/neutron_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/neutron_wsgi_access_ssl.txt Oct 12 14:53:36 np0005481648.novalocal sudo[101753]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101753]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal sudo[101756]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/manila_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/manila_wsgi_access_ssl.txt Oct 12 14:53:36 np0005481648.novalocal sudo[101756]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101756]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal sudo[101759]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/keystone_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/keystone_wsgi_access_ssl.txt Oct 12 14:53:36 np0005481648.novalocal sudo[101759]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101759]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal sudo[101718]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal systemd[1]: session-c306.scope: Deactivated successfully. Oct 12 14:53:36 np0005481648.novalocal sudo[101762]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/glance_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/glance_wsgi_access_ssl.txt Oct 12 14:53:36 np0005481648.novalocal sudo[101762]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101762]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal sudo[101766]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/cinder_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/cinder_wsgi_access_ssl.txt Oct 12 14:53:36 np0005481648.novalocal sudo[101766]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101765]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Oct 12 14:53:36 np0005481648.novalocal sudo[101766]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal systemd[1]: Started Session c307 of User root. Oct 12 14:53:36 np0005481648.novalocal sudo[101765]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Oct 12 14:53:36 np0005481648.novalocal sudo[101770]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/redis/redis.log /var/log/weirdo-project/logs/redis/redis.txt Oct 12 14:53:36 np0005481648.novalocal sudo[101770]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101770]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal sudo[101774]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/redis/sentinel.log /var/log/weirdo-project/logs/redis/sentinel.txt Oct 12 14:53:36 np0005481648.novalocal sudo[101774]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101774]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal sudo[101777]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dnf/dnf.log /var/log/weirdo-project/logs/dnf/dnf.txt Oct 12 14:53:36 np0005481648.novalocal sudo[101777]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101777]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal sudo[101780]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dnf/dnf.rpm.log /var/log/weirdo-project/logs/dnf/dnf.rpm.txt Oct 12 14:53:36 np0005481648.novalocal sudo[101780]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101780]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal sudo[101784]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/zuul /var/log/weirdo-project/logs/sudoers.d/zuul.txt Oct 12 14:53:36 np0005481648.novalocal sudo[101784]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101784]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal sudo[101787]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/90-cloud-init-users /var/log/weirdo-project/logs/sudoers.d/90-cloud-init-users.txt Oct 12 14:53:36 np0005481648.novalocal sudo[101787]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101787]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal sudo[101790]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/glance /var/log/weirdo-project/logs/sudoers.d/glance.txt Oct 12 14:53:36 np0005481648.novalocal sudo[101790]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101790]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal sudo[101793]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/neutron /var/log/weirdo-project/logs/sudoers.d/neutron.txt Oct 12 14:53:36 np0005481648.novalocal sudo[101793]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101793]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal sudo[101796]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/cinder /var/log/weirdo-project/logs/sudoers.d/cinder.txt Oct 12 14:53:36 np0005481648.novalocal sudo[101796]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101796]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal sudo[101800]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/nova /var/log/weirdo-project/logs/sudoers.d/nova.txt Oct 12 14:53:36 np0005481648.novalocal sudo[101800]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101800]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal sudo[101803]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/manila /var/log/weirdo-project/logs/sudoers.d/manila.txt Oct 12 14:53:36 np0005481648.novalocal sudo[101803]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101803]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal sudo[101765]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal systemd[1]: session-c307.scope: Deactivated successfully. Oct 12 14:53:36 np0005481648.novalocal sudo[101806]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-eth /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-eth.txt Oct 12 14:53:36 np0005481648.novalocal sudo[101806]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101806]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal sudo[101809]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ipv6.txt Oct 12 14:53:36 np0005481648.novalocal sudo[101809]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101809]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal sudo[101812]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ovs /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ovs.txt Oct 12 14:53:36 np0005481648.novalocal sudo[101812]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101812]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:36 np0005481648.novalocal sudo[101815]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-post /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-post.txt Oct 12 14:53:36 np0005481648.novalocal sudo[101815]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:36 np0005481648.novalocal sudo[101815]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:37 np0005481648.novalocal sudo[101818]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-routes /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-routes.txt Oct 12 14:53:37 np0005481648.novalocal sudo[101818]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:37 np0005481648.novalocal sudo[101818]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:37 np0005481648.novalocal sudo[101821]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-tunnel /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-tunnel.txt Oct 12 14:53:37 np0005481648.novalocal sudo[101821]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:37 np0005481648.novalocal sudo[101821]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:37 np0005481648.novalocal sudo[101824]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/init.ipv6-global /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/init.ipv6-global.txt Oct 12 14:53:37 np0005481648.novalocal sudo[101824]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:37 np0005481648.novalocal sudo[101824]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:37 np0005481648.novalocal sudo[101827]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions.txt Oct 12 14:53:37 np0005481648.novalocal sudo[101827]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:37 np0005481648.novalocal sudo[101827]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:37 np0005481648.novalocal sudo[101830]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions-ipv6.txt Oct 12 14:53:37 np0005481648.novalocal sudo[101830]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:37 np0005481648.novalocal sudo[101830]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:37 np0005481648.novalocal sudo[101833]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-br-ex /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-br-ex.txt Oct 12 14:53:37 np0005481648.novalocal sudo[101833]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:37 np0005481648.novalocal sudo[101833]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:37 np0005481648.novalocal sudo[101836]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-lo /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-lo.txt Oct 12 14:53:37 np0005481648.novalocal sudo[101836]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:37 np0005481648.novalocal sudo[101836]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:37 np0005481648.novalocal sudo[101839]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown.txt Oct 12 14:53:37 np0005481648.novalocal sudo[101839]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:37 np0005481648.novalocal sudo[101839]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:37 np0005481648.novalocal sudo[101842]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-eth /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-eth.txt Oct 12 14:53:37 np0005481648.novalocal sudo[101842]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:37 np0005481648.novalocal sudo[101842]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:37 np0005481648.novalocal sudo[101845]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ipv6.txt Oct 12 14:53:37 np0005481648.novalocal sudo[101845]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:37 np0005481648.novalocal sudo[101845]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:37 np0005481648.novalocal sudo[101848]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ovs /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ovs.txt Oct 12 14:53:37 np0005481648.novalocal sudo[101848]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:37 np0005481648.novalocal sudo[101848]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:37 np0005481648.novalocal sudo[101851]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-post /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-post.txt Oct 12 14:53:37 np0005481648.novalocal sudo[101851]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:37 np0005481648.novalocal sudo[101851]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:37 np0005481648.novalocal sudo[101854]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-routes /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-routes.txt Oct 12 14:53:37 np0005481648.novalocal sudo[101854]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:37 np0005481648.novalocal sudo[101854]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:37 np0005481648.novalocal sudo[101857]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-tunnel /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-tunnel.txt Oct 12 14:53:37 np0005481648.novalocal sudo[101857]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:37 np0005481648.novalocal sudo[101857]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:37 np0005481648.novalocal sudo[101860]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup.txt Oct 12 14:53:37 np0005481648.novalocal sudo[101860]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:37 np0005481648.novalocal sudo[101860]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:37 np0005481648.novalocal sudo[101863]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-aliases /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-aliases.txt Oct 12 14:53:37 np0005481648.novalocal sudo[101863]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:37 np0005481648.novalocal sudo[101863]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:37 np0005481648.novalocal sudo[101866]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-eth0 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-eth0.txt Oct 12 14:53:37 np0005481648.novalocal sudo[101866]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:37 np0005481648.novalocal sudo[101866]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:37 np0005481648.novalocal sudo[101869]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/readme-ifcfg-rh.txt /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/readme-ifcfg-rh.txt.txt Oct 12 14:53:37 np0005481648.novalocal sudo[101869]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:37 np0005481648.novalocal sudo[101869]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:37 np0005481648.novalocal sudo[101872]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-loop1 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-loop1.txt Oct 12 14:53:37 np0005481648.novalocal sudo[101872]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:37 np0005481648.novalocal sudo[101872]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:37 np0005481648.novalocal sudo[101875]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/libvirt-guests /var/log/weirdo-project/logs/etc/sysconfig/libvirt-guests.txt Oct 12 14:53:37 np0005481648.novalocal sudo[101875]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:37 np0005481648.novalocal sudo[101875]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:37 np0005481648.novalocal sudo[101878]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/ovn-northd /var/log/weirdo-project/logs/etc/sysconfig/ovn-northd.txt Oct 12 14:53:37 np0005481648.novalocal sudo[101878]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:37 np0005481648.novalocal sudo[101878]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:37 np0005481648.novalocal sudo[101881]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/ovn-controller /var/log/weirdo-project/logs/etc/sysconfig/ovn-controller.txt Oct 12 14:53:37 np0005481648.novalocal sudo[101881]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:37 np0005481648.novalocal sudo[101881]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:37 np0005481648.novalocal sudo[101884]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/api-paste.ini /var/log/weirdo-project/logs/etc/cinder/api-paste.ini.txt Oct 12 14:53:37 np0005481648.novalocal sudo[101884]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:37 np0005481648.novalocal sudo[101884]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:37 np0005481648.novalocal sudo[101887]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/cinder.conf /var/log/weirdo-project/logs/etc/cinder/cinder.conf.txt Oct 12 14:53:37 np0005481648.novalocal sudo[101887]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:37 np0005481648.novalocal sudo[101887]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:37 np0005481648.novalocal sudo[101890]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/resource_filters.json /var/log/weirdo-project/logs/etc/cinder/resource_filters.json.txt Oct 12 14:53:37 np0005481648.novalocal sudo[101890]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:37 np0005481648.novalocal sudo[101890]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:37 np0005481648.novalocal sudo[101893]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/rootwrap.conf /var/log/weirdo-project/logs/etc/cinder/rootwrap.conf.txt Oct 12 14:53:37 np0005481648.novalocal sudo[101893]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:37 np0005481648.novalocal sudo[101893]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:37 np0005481648.novalocal sudo[101896]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/policy.yaml /var/log/weirdo-project/logs/etc/cinder/policy.yaml.txt Oct 12 14:53:37 np0005481648.novalocal sudo[101896]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:37 np0005481648.novalocal sudo[101896]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:37 np0005481648.novalocal sudo[101899]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/ssl/private/np0005481648.novalocal.pem /var/log/weirdo-project/logs/etc/cinder/ssl/private/np0005481648.novalocal.pem.txt Oct 12 14:53:37 np0005481648.novalocal sudo[101899]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:37 np0005481648.novalocal sudo[101899]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:37 np0005481648.novalocal sudo[101902]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/policy.yaml /var/log/weirdo-project/logs/etc/glance/policy.yaml.txt Oct 12 14:53:37 np0005481648.novalocal sudo[101902]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:37 np0005481648.novalocal sudo[101902]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:37 np0005481648.novalocal sudo[101905]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-api-paste.ini /var/log/weirdo-project/logs/etc/glance/glance-api-paste.ini.txt Oct 12 14:53:37 np0005481648.novalocal sudo[101905]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:37 np0005481648.novalocal sudo[101905]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:37 np0005481648.novalocal sudo[101908]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-api.conf /var/log/weirdo-project/logs/etc/glance/glance-api.conf.txt Oct 12 14:53:37 np0005481648.novalocal sudo[101908]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:37 np0005481648.novalocal sudo[101908]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:37 np0005481648.novalocal sudo[101911]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-cache.conf /var/log/weirdo-project/logs/etc/glance/glance-cache.conf.txt Oct 12 14:53:37 np0005481648.novalocal sudo[101911]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:37 np0005481648.novalocal sudo[101911]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:37 np0005481648.novalocal sudo[101914]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-image-import.conf /var/log/weirdo-project/logs/etc/glance/glance-image-import.conf.txt Oct 12 14:53:37 np0005481648.novalocal sudo[101914]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:37 np0005481648.novalocal sudo[101914]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:37 np0005481648.novalocal sudo[101917]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-scrubber.conf /var/log/weirdo-project/logs/etc/glance/glance-scrubber.conf.txt Oct 12 14:53:37 np0005481648.novalocal sudo[101917]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:37 np0005481648.novalocal sudo[101917]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:38 np0005481648.novalocal sudo[101920]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-swift.conf /var/log/weirdo-project/logs/etc/glance/glance-swift.conf.txt Oct 12 14:53:38 np0005481648.novalocal sudo[101920]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:38 np0005481648.novalocal sudo[101920]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:38 np0005481648.novalocal sudo[101923]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/rootwrap.conf /var/log/weirdo-project/logs/etc/glance/rootwrap.conf.txt Oct 12 14:53:38 np0005481648.novalocal sudo[101923]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:38 np0005481648.novalocal sudo[101923]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:38 np0005481648.novalocal sudo[101926]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/schema-image.json /var/log/weirdo-project/logs/etc/glance/schema-image.json.txt Oct 12 14:53:38 np0005481648.novalocal sudo[101926]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:38 np0005481648.novalocal sudo[101926]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:38 np0005481648.novalocal sudo[101929]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-iops-filter.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-iops-filter.json.txt Oct 12 14:53:38 np0005481648.novalocal sudo[101929]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:38 np0005481648.novalocal sudo[101929]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:38 np0005481648.novalocal sudo[101932]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-processor-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-processor-allocation-setting-data.json.txt Oct 12 14:53:38 np0005481648.novalocal sudo[101932]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:38 np0005481648.novalocal sudo[101932]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:38 np0005481648.novalocal sudo[101935]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-resource-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-resource-allocation-setting-data.json.txt Oct 12 14:53:38 np0005481648.novalocal sudo[101935]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:38 np0005481648.novalocal sudo[101935]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:38 np0005481648.novalocal sudo[101938]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-storage-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-storage-allocation-setting-data.json.txt Oct 12 14:53:38 np0005481648.novalocal sudo[101938]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:38 np0005481648.novalocal sudo[101938]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:38 np0005481648.novalocal sudo[101941]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-virtual-system-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-virtual-system-setting-data.json.txt Oct 12 14:53:38 np0005481648.novalocal sudo[101941]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:38 np0005481648.novalocal sudo[101941]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:38 np0005481648.novalocal sudo[101944]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-disk-filter.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-disk-filter.json.txt Oct 12 14:53:38 np0005481648.novalocal sudo[101944]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:38 np0005481648.novalocal sudo[101944]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:38 np0005481648.novalocal sudo[101947]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-num-instances.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-num-instances.json.txt Oct 12 14:53:38 np0005481648.novalocal sudo[101947]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:38 np0005481648.novalocal sudo[101947]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:38 np0005481648.novalocal sudo[101950]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-mode.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-mode.json.txt Oct 12 14:53:38 np0005481648.novalocal sudo[101950]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:38 np0005481648.novalocal sudo[101950]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:38 np0005481648.novalocal sudo[101953]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-pinning.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-pinning.json.txt Oct 12 14:53:38 np0005481648.novalocal sudo[101953]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:38 np0005481648.novalocal sudo[101953]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:38 np0005481648.novalocal sudo[101956]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-memory-backing.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-memory-backing.json.txt Oct 12 14:53:38 np0005481648.novalocal sudo[101956]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:38 np0005481648.novalocal sudo[101956]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:38 np0005481648.novalocal sudo[101959]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-shutdown.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-shutdown.json.txt Oct 12 14:53:38 np0005481648.novalocal sudo[101959]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:38 np0005481648.novalocal sudo[101959]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:38 np0005481648.novalocal sudo[101962]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-host-capabilities.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-host-capabilities.json.txt Oct 12 14:53:38 np0005481648.novalocal sudo[101962]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:38 np0005481648.novalocal sudo[101962]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:38 np0005481648.novalocal sudo[101965]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-hypervisor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-hypervisor.json.txt Oct 12 14:53:38 np0005481648.novalocal sudo[101965]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:38 np0005481648.novalocal sudo[101965]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:38 np0005481648.novalocal sudo[101968]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-instance-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-instance-data.json.txt Oct 12 14:53:38 np0005481648.novalocal sudo[101968]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:38 np0005481648.novalocal sudo[101968]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:38 np0005481648.novalocal sudo[101971]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt-image.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt-image.json.txt Oct 12 14:53:38 np0005481648.novalocal sudo[101971]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:38 np0005481648.novalocal sudo[101971]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:38 np0005481648.novalocal sudo[101974]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt.json.txt Oct 12 14:53:38 np0005481648.novalocal sudo[101974]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:38 np0005481648.novalocal sudo[101974]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:38 np0005481648.novalocal sudo[101977]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-quota.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-quota.json.txt Oct 12 14:53:38 np0005481648.novalocal sudo[101977]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:38 np0005481648.novalocal sudo[101977]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:38 np0005481648.novalocal sudo[101980]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-randomgen.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-randomgen.json.txt Oct 12 14:53:38 np0005481648.novalocal sudo[101980]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:38 np0005481648.novalocal sudo[101980]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:38 np0005481648.novalocal sudo[101983]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vcputopology.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vcputopology.json.txt Oct 12 14:53:38 np0005481648.novalocal sudo[101983]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:38 np0005481648.novalocal sudo[101983]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:38 np0005481648.novalocal sudo[101986]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-flavor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-flavor.json.txt Oct 12 14:53:38 np0005481648.novalocal sudo[101986]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:38 np0005481648.novalocal sudo[101986]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:38 np0005481648.novalocal sudo[101989]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-quota-flavor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-quota-flavor.json.txt Oct 12 14:53:38 np0005481648.novalocal sudo[101989]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:38 np0005481648.novalocal sudo[101989]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:38 np0005481648.novalocal sudo[101992]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware.json.txt Oct 12 14:53:38 np0005481648.novalocal sudo[101992]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:38 np0005481648.novalocal sudo[101992]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:38 np0005481648.novalocal sudo[101995]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm-hw.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm-hw.json.txt Oct 12 14:53:38 np0005481648.novalocal sudo[101995]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:38 np0005481648.novalocal sudo[101995]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:38 np0005481648.novalocal sudo[101998]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm.json.txt Oct 12 14:53:38 np0005481648.novalocal sudo[101998]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:38 np0005481648.novalocal sudo[101998]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:38 np0005481648.novalocal sudo[102001]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-watchdog.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-watchdog.json.txt Oct 12 14:53:38 np0005481648.novalocal sudo[102001]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:38 np0005481648.novalocal sudo[102001]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:38 np0005481648.novalocal sudo[102004]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-xenapi.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-xenapi.json.txt Oct 12 14:53:38 np0005481648.novalocal sudo[102004]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:39 np0005481648.novalocal sudo[102004]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:39 np0005481648.novalocal sudo[102007]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/glance-common-image-props.json /var/log/weirdo-project/logs/etc/glance/metadefs/glance-common-image-props.json.txt Oct 12 14:53:39 np0005481648.novalocal sudo[102007]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:39 np0005481648.novalocal sudo[102007]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:39 np0005481648.novalocal sudo[102010]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/image-signature-verification.json /var/log/weirdo-project/logs/etc/glance/metadefs/image-signature-verification.json.txt Oct 12 14:53:39 np0005481648.novalocal sudo[102010]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:39 np0005481648.novalocal sudo[102010]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:39 np0005481648.novalocal sudo[102013]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/operating-system.json /var/log/weirdo-project/logs/etc/glance/metadefs/operating-system.json.txt Oct 12 14:53:39 np0005481648.novalocal sudo[102013]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:39 np0005481648.novalocal sudo[102013]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:39 np0005481648.novalocal sudo[102016]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-databases.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-databases.json.txt Oct 12 14:53:39 np0005481648.novalocal sudo[102016]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:39 np0005481648.novalocal sudo[102016]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:39 np0005481648.novalocal sudo[102019]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-runtimes.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-runtimes.json.txt Oct 12 14:53:39 np0005481648.novalocal sudo[102019]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:39 np0005481648.novalocal sudo[102019]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:39 np0005481648.novalocal sudo[102022]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-webservers.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-webservers.json.txt Oct 12 14:53:39 np0005481648.novalocal sudo[102022]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:39 np0005481648.novalocal sudo[102022]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:39 np0005481648.novalocal sudo[102025]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/storage-volume-type.json /var/log/weirdo-project/logs/etc/glance/metadefs/storage-volume-type.json.txt Oct 12 14:53:39 np0005481648.novalocal sudo[102025]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:39 np0005481648.novalocal sudo[102025]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:39 np0005481648.novalocal sudo[102028]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/ssl/private/np0005481648.novalocal.pem /var/log/weirdo-project/logs/etc/glance/ssl/private/np0005481648.novalocal.pem.txt Oct 12 14:53:39 np0005481648.novalocal sudo[102028]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:39 np0005481648.novalocal sudo[102028]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:39 np0005481648.novalocal sudo[102031]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/1 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/1.txt Oct 12 14:53:39 np0005481648.novalocal sudo[102031]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:39 np0005481648.novalocal sudo[102031]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:39 np0005481648.novalocal sudo[102034]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/0 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/0.txt Oct 12 14:53:39 np0005481648.novalocal sudo[102034]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:39 np0005481648.novalocal sudo[102034]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:39 np0005481648.novalocal sudo[102037]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/credential-keys/1 /var/log/weirdo-project/logs/etc/keystone/credential-keys/1.txt Oct 12 14:53:39 np0005481648.novalocal sudo[102037]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:39 np0005481648.novalocal sudo[102037]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:39 np0005481648.novalocal sudo[102040]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/credential-keys/0 /var/log/weirdo-project/logs/etc/keystone/credential-keys/0.txt Oct 12 14:53:39 np0005481648.novalocal sudo[102040]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:39 np0005481648.novalocal sudo[102040]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:39 np0005481648.novalocal sudo[102043]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/keystone.conf /var/log/weirdo-project/logs/etc/keystone/keystone.conf.txt Oct 12 14:53:39 np0005481648.novalocal sudo[102043]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:39 np0005481648.novalocal sudo[102043]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:39 np0005481648.novalocal sudo[102046]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/logging.conf /var/log/weirdo-project/logs/etc/keystone/logging.conf.txt Oct 12 14:53:39 np0005481648.novalocal sudo[102046]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:39 np0005481648.novalocal sudo[102046]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:39 np0005481648.novalocal sudo[102049]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/sso_callback_template.html /var/log/weirdo-project/logs/etc/keystone/sso_callback_template.html.txt Oct 12 14:53:39 np0005481648.novalocal sudo[102049]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:39 np0005481648.novalocal sudo[102049]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:39 np0005481648.novalocal sudo[102052]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/policy.yaml /var/log/weirdo-project/logs/etc/keystone/policy.yaml.txt Oct 12 14:53:39 np0005481648.novalocal sudo[102052]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:39 np0005481648.novalocal sudo[102052]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:39 np0005481648.novalocal sudo[102055]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/ssl/private/np0005481648.novalocal.pem /var/log/weirdo-project/logs/etc/keystone/ssl/private/np0005481648.novalocal.pem.txt Oct 12 14:53:39 np0005481648.novalocal sudo[102055]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:39 np0005481648.novalocal sudo[102055]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:39 np0005481648.novalocal sudo[102058]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/ssl/private/np0005481648.novalocal.pem /var/log/weirdo-project/logs/etc/manila/ssl/private/np0005481648.novalocal.pem.txt Oct 12 14:53:39 np0005481648.novalocal sudo[102058]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:39 np0005481648.novalocal sudo[102058]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:39 np0005481648.novalocal sudo[102061]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/policy.yaml /var/log/weirdo-project/logs/etc/manila/policy.yaml.txt Oct 12 14:53:39 np0005481648.novalocal sudo[102061]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:39 np0005481648.novalocal sudo[102061]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:39 np0005481648.novalocal sudo[102064]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/api-paste.ini /var/log/weirdo-project/logs/etc/manila/api-paste.ini.txt Oct 12 14:53:39 np0005481648.novalocal sudo[102064]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:39 np0005481648.novalocal sudo[102064]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:39 np0005481648.novalocal sudo[102067]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/manila.conf /var/log/weirdo-project/logs/etc/manila/manila.conf.txt Oct 12 14:53:39 np0005481648.novalocal sudo[102067]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:39 np0005481648.novalocal sudo[102067]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:39 np0005481648.novalocal sudo[102070]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/rootwrap.conf /var/log/weirdo-project/logs/etc/manila/rootwrap.conf.txt Oct 12 14:53:39 np0005481648.novalocal sudo[102070]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:39 np0005481648.novalocal sudo[102070]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:39 np0005481648.novalocal sudo[102073]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ssl/private/np0005481648.novalocal.pem /var/log/weirdo-project/logs/etc/neutron/ssl/private/np0005481648.novalocal.pem.txt Oct 12 14:53:39 np0005481648.novalocal sudo[102073]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:39 np0005481648.novalocal sudo[102073]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:39 np0005481648.novalocal sudo[102077]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/neutron/ovnnb-privkey.pem.txt Oct 12 14:53:39 np0005481648.novalocal sudo[102077]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:39 np0005481648.novalocal sudo[102077]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:39 np0005481648.novalocal sudo[102080]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/neutron/ovnnb-cert.pem.txt Oct 12 14:53:39 np0005481648.novalocal sudo[102080]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:39 np0005481648.novalocal sudo[102080]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:39 np0005481648.novalocal sudo[102083]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/neutron/ovnsb-privkey.pem.txt Oct 12 14:53:39 np0005481648.novalocal sudo[102083]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:39 np0005481648.novalocal sudo[102083]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:39 np0005481648.novalocal sudo[102086]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/neutron/ovnsb-cert.pem.txt Oct 12 14:53:39 np0005481648.novalocal sudo[102086]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:39 np0005481648.novalocal sudo[102086]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:39 np0005481648.novalocal sudo[102089]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/switchcacert.pem /var/log/weirdo-project/logs/etc/neutron/switchcacert.pem.txt Oct 12 14:53:39 np0005481648.novalocal sudo[102089]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:39 np0005481648.novalocal sudo[102089]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:39 np0005481648.novalocal sudo[102092]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/policy.yaml /var/log/weirdo-project/logs/etc/neutron/policy.yaml.txt Oct 12 14:53:39 np0005481648.novalocal sudo[102092]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:39 np0005481648.novalocal sudo[102092]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:39 np0005481648.novalocal sudo[102096]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/neutron.conf /var/log/weirdo-project/logs/etc/neutron/neutron.conf.txt Oct 12 14:53:39 np0005481648.novalocal sudo[102096]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:39 np0005481648.novalocal sudo[102096]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:39 np0005481648.novalocal sudo[102099]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/rootwrap.conf /var/log/weirdo-project/logs/etc/neutron/rootwrap.conf.txt Oct 12 14:53:39 np0005481648.novalocal sudo[102099]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:39 np0005481648.novalocal sudo[102099]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:40 np0005481648.novalocal sudo[102102]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/api-paste.ini /var/log/weirdo-project/logs/etc/neutron/api-paste.ini.txt Oct 12 14:53:40 np0005481648.novalocal sudo[102102]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:40 np0005481648.novalocal sudo[102102]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:40 np0005481648.novalocal sudo[102105]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/dhcp_agent.ini /var/log/weirdo-project/logs/etc/neutron/dhcp_agent.ini.txt Oct 12 14:53:40 np0005481648.novalocal sudo[102105]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:40 np0005481648.novalocal sudo[102105]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:40 np0005481648.novalocal sudo[102108]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/l3_agent.ini /var/log/weirdo-project/logs/etc/neutron/l3_agent.ini.txt Oct 12 14:53:40 np0005481648.novalocal sudo[102108]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:40 np0005481648.novalocal sudo[102108]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:40 np0005481648.novalocal sudo[102111]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/metadata_agent.ini /var/log/weirdo-project/logs/etc/neutron/metadata_agent.ini.txt Oct 12 14:53:40 np0005481648.novalocal sudo[102111]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:40 np0005481648.novalocal sudo[102111]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:40 np0005481648.novalocal sudo[102114]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovn_vpn_agent.ini /var/log/weirdo-project/logs/etc/neutron/ovn_vpn_agent.ini.txt Oct 12 14:53:40 np0005481648.novalocal sudo[102114]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:40 np0005481648.novalocal sudo[102114]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:40 np0005481648.novalocal sudo[102117]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/neutron_vpnaas.conf /var/log/weirdo-project/logs/etc/neutron/neutron_vpnaas.conf.txt Oct 12 14:53:40 np0005481648.novalocal sudo[102117]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:40 np0005481648.novalocal sudo[102117]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:40 np0005481648.novalocal sudo[102120]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/vpn_agent.ini /var/log/weirdo-project/logs/etc/neutron/vpn_agent.ini.txt Oct 12 14:53:40 np0005481648.novalocal sudo[102120]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:40 np0005481648.novalocal sudo[102120]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:40 np0005481648.novalocal sudo[102123]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/conf.d/README /var/log/weirdo-project/logs/etc/neutron/conf.d/README.txt Oct 12 14:53:40 np0005481648.novalocal sudo[102123]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:40 np0005481648.novalocal sudo[102123]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:40 np0005481648.novalocal sudo[102126]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ml2_conf.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ml2_conf.ini.txt Oct 12 14:53:40 np0005481648.novalocal sudo[102126]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:40 np0005481648.novalocal sudo[102126]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:40 np0005481648.novalocal sudo[102129]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ovn_agent.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ovn_agent.ini.txt Oct 12 14:53:40 np0005481648.novalocal sudo[102129]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:40 np0005481648.novalocal sudo[102129]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:40 np0005481648.novalocal sudo[102132]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/sriov_agent.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/sriov_agent.ini.txt Oct 12 14:53:40 np0005481648.novalocal sudo[102132]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:40 np0005481648.novalocal sudo[102132]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:40 np0005481648.novalocal sudo[102135]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/api-paste.ini /var/log/weirdo-project/logs/etc/nova/api-paste.ini.txt Oct 12 14:53:40 np0005481648.novalocal sudo[102135]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:40 np0005481648.novalocal sudo[102135]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:40 np0005481648.novalocal sudo[102138]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/nova.conf /var/log/weirdo-project/logs/etc/nova/nova.conf.txt Oct 12 14:53:40 np0005481648.novalocal sudo[102138]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:40 np0005481648.novalocal sudo[102138]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:40 np0005481648.novalocal sudo[102141]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/release /var/log/weirdo-project/logs/etc/nova/release.txt Oct 12 14:53:40 np0005481648.novalocal sudo[102141]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:40 np0005481648.novalocal sudo[102141]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:40 np0005481648.novalocal sudo[102144]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/rootwrap.conf /var/log/weirdo-project/logs/etc/nova/rootwrap.conf.txt Oct 12 14:53:40 np0005481648.novalocal sudo[102144]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:40 np0005481648.novalocal sudo[102144]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:40 np0005481648.novalocal sudo[102147]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/nova-compute.conf /var/log/weirdo-project/logs/etc/nova/nova-compute.conf.txt Oct 12 14:53:40 np0005481648.novalocal sudo[102147]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:40 np0005481648.novalocal sudo[102147]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:40 np0005481648.novalocal sudo[102150]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/policy.yaml /var/log/weirdo-project/logs/etc/nova/policy.yaml.txt Oct 12 14:53:40 np0005481648.novalocal sudo[102150]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:40 np0005481648.novalocal sudo[102150]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:40 np0005481648.novalocal sudo[102153]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/ssl/private/np0005481648.novalocal.pem /var/log/weirdo-project/logs/etc/nova/ssl/private/np0005481648.novalocal.pem.txt Oct 12 14:53:40 np0005481648.novalocal sudo[102153]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:40 np0005481648.novalocal sudo[102153]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:40 np0005481648.novalocal sudo[102156]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/octavia/ovnnb-privkey.pem.txt Oct 12 14:53:40 np0005481648.novalocal sudo[102156]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:40 np0005481648.novalocal sudo[102156]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:40 np0005481648.novalocal sudo[102159]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/octavia.conf /var/log/weirdo-project/logs/etc/octavia/octavia.conf.txt Oct 12 14:53:40 np0005481648.novalocal sudo[102159]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:40 np0005481648.novalocal sudo[102159]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:40 np0005481648.novalocal sudo[102162]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/policy.yaml /var/log/weirdo-project/logs/etc/octavia/policy.yaml.txt Oct 12 14:53:40 np0005481648.novalocal sudo[102162]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:40 np0005481648.novalocal sudo[102162]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:40 np0005481648.novalocal sudo[102165]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/octavia/ovnnb-cert.pem.txt Oct 12 14:53:40 np0005481648.novalocal sudo[102165]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:40 np0005481648.novalocal sudo[102165]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:40 np0005481648.novalocal sudo[102168]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/octavia/ovnsb-privkey.pem.txt Oct 12 14:53:40 np0005481648.novalocal sudo[102168]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:40 np0005481648.novalocal sudo[102168]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:40 np0005481648.novalocal sudo[102171]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/octavia/ovnsb-cert.pem.txt Oct 12 14:53:40 np0005481648.novalocal sudo[102171]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:40 np0005481648.novalocal sudo[102171]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:40 np0005481648.novalocal sudo[102174]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/switchcacert.pem /var/log/weirdo-project/logs/etc/octavia/switchcacert.pem.txt Oct 12 14:53:40 np0005481648.novalocal sudo[102174]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:40 np0005481648.novalocal sudo[102174]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:40 np0005481648.novalocal sudo[102177]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.cert.pem /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.cert.pem.txt Oct 12 14:53:40 np0005481648.novalocal sudo[102177]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:40 np0005481648.novalocal sudo[102177]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:40 np0005481648.novalocal sudo[102180]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.key.pem /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.key.pem.txt Oct 12 14:53:40 np0005481648.novalocal sudo[102180]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:40 np0005481648.novalocal sudo[102180]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:40 np0005481648.novalocal sudo[102183]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/client_ca.cert.pem /var/log/weirdo-project/logs/etc/octavia/certs/client_ca.cert.pem.txt Oct 12 14:53:40 np0005481648.novalocal sudo[102183]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:40 np0005481648.novalocal sudo[102183]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:41 np0005481648.novalocal sudo[102186]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/client.cert-and-key.pem /var/log/weirdo-project/logs/etc/octavia/certs/client.cert-and-key.pem.txt Oct 12 14:53:41 np0005481648.novalocal sudo[102186]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:41 np0005481648.novalocal sudo[102186]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:41 np0005481648.novalocal sudo[102189]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ssl/private/np0005481648.novalocal.pem /var/log/weirdo-project/logs/etc/octavia/ssl/private/np0005481648.novalocal.pem.txt Oct 12 14:53:41 np0005481648.novalocal sudo[102189]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:41 np0005481648.novalocal sudo[102189]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:41 np0005481648.novalocal sudo[102192]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/placement.conf /var/log/weirdo-project/logs/etc/placement/placement.conf.txt Oct 12 14:53:41 np0005481648.novalocal sudo[102192]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:41 np0005481648.novalocal sudo[102192]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:41 np0005481648.novalocal sudo[102195]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/policy.yaml /var/log/weirdo-project/logs/etc/placement/policy.yaml.txt Oct 12 14:53:41 np0005481648.novalocal sudo[102195]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:41 np0005481648.novalocal sudo[102195]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:41 np0005481648.novalocal sudo[102198]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/ssl/private/np0005481648.novalocal.pem /var/log/weirdo-project/logs/etc/placement/ssl/private/np0005481648.novalocal.pem.txt Oct 12 14:53:41 np0005481648.novalocal sudo[102198]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:41 np0005481648.novalocal sudo[102198]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:41 np0005481648.novalocal sudo[102201]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/accounts.yaml.sample /var/log/weirdo-project/logs/etc/tempest/accounts.yaml.sample.txt Oct 12 14:53:41 np0005481648.novalocal sudo[102201]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:41 np0005481648.novalocal sudo[102201]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:41 np0005481648.novalocal sudo[102204]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/allow-list.yaml /var/log/weirdo-project/logs/etc/tempest/allow-list.yaml.txt Oct 12 14:53:41 np0005481648.novalocal sudo[102204]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:41 np0005481648.novalocal sudo[102204]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:41 np0005481648.novalocal sudo[102207]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/logging.conf.sample /var/log/weirdo-project/logs/etc/tempest/logging.conf.sample.txt Oct 12 14:53:41 np0005481648.novalocal sudo[102207]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:41 np0005481648.novalocal sudo[102207]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:41 np0005481648.novalocal sudo[102210]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/rbac-persona-accounts.yaml.sample /var/log/weirdo-project/logs/etc/tempest/rbac-persona-accounts.yaml.sample.txt Oct 12 14:53:41 np0005481648.novalocal sudo[102210]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:41 np0005481648.novalocal sudo[102210]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:41 np0005481648.novalocal sudo[102213]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/tempest.conf /var/log/weirdo-project/logs/etc/tempest/tempest.conf.txt Oct 12 14:53:41 np0005481648.novalocal sudo[102213]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:41 np0005481648.novalocal sudo[102213]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:41 np0005481648.novalocal sudo[102216]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyslog.d/21-cloudinit.conf /var/log/weirdo-project/logs/etc/rsyslog.d/21-cloudinit.conf.txt Oct 12 14:53:41 np0005481648.novalocal sudo[102216]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:41 np0005481648.novalocal sudo[102216]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:41 np0005481648.novalocal sudo[102219]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyslog.conf /var/log/weirdo-project/logs/etc/rsyslog.conf.txt Oct 12 14:53:41 np0005481648.novalocal sudo[102219]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:41 np0005481648.novalocal sudo[102219]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:41 np0005481648.novalocal sudo[102222]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/ssl/private/np0005481648.novalocal.pem /var/log/weirdo-project/logs/etc/rabbitmq/ssl/private/np0005481648.novalocal.pem.txt Oct 12 14:53:41 np0005481648.novalocal sudo[102222]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:41 np0005481648.novalocal sudo[102222]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:41 np0005481648.novalocal sudo[102225]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.conf.txt Oct 12 14:53:41 np0005481648.novalocal sudo[102225]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:41 np0005481648.novalocal sudo[102225]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:41 np0005481648.novalocal sudo[102228]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.config /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.config.txt Oct 12 14:53:41 np0005481648.novalocal sudo[102228]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:41 np0005481648.novalocal sudo[102228]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:41 np0005481648.novalocal sudo[102231]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq-env.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq-env.conf.txt Oct 12 14:53:41 np0005481648.novalocal sudo[102231]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:41 np0005481648.novalocal sudo[102231]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:41 np0005481648.novalocal sudo[102234]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/inetrc /var/log/weirdo-project/logs/etc/rabbitmq/inetrc.txt Oct 12 14:53:41 np0005481648.novalocal sudo[102234]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:41 np0005481648.novalocal sudo[102234]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:41 np0005481648.novalocal sudo[102237]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmqadmin.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmqadmin.conf.txt Oct 12 14:53:41 np0005481648.novalocal sudo[102237]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:41 np0005481648.novalocal sudo[102237]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:41 np0005481648.novalocal sudo[102240]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/enabled_plugins /var/log/weirdo-project/logs/etc/rabbitmq/enabled_plugins.txt Oct 12 14:53:41 np0005481648.novalocal sudo[102240]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:41 np0005481648.novalocal sudo[102240]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:41 np0005481648.novalocal sudo[102243]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf /var/log/weirdo-project/logs/etc/my.cnf.txt Oct 12 14:53:41 np0005481648.novalocal sudo[102243]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:41 np0005481648.novalocal sudo[102243]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:41 np0005481648.novalocal sudo[102246]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/auth_gssapi.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/auth_gssapi.cnf.txt Oct 12 14:53:41 np0005481648.novalocal sudo[102246]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:41 np0005481648.novalocal sudo[102246]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:41 np0005481648.novalocal sudo[102249]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/enable_encryption.preset /var/log/weirdo-project/logs/etc/my.cnf.d/enable_encryption.preset.txt Oct 12 14:53:41 np0005481648.novalocal sudo[102249]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:41 np0005481648.novalocal sudo[102249]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:41 np0005481648.novalocal sudo[102252]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/mariadb-server.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/mariadb-server.cnf.txt Oct 12 14:53:41 np0005481648.novalocal sudo[102252]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:41 np0005481648.novalocal sudo[102252]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:41 np0005481648.novalocal sudo[102255]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/spider.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/spider.cnf.txt Oct 12 14:53:41 np0005481648.novalocal sudo[102255]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:41 np0005481648.novalocal sudo[102255]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:41 np0005481648.novalocal sudo[102258]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/mysql-clients.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/mysql-clients.cnf.txt Oct 12 14:53:41 np0005481648.novalocal sudo[102258]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:41 np0005481648.novalocal sudo[102258]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:41 np0005481648.novalocal sudo[102261]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/server.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/server.cnf.txt Oct 12 14:53:41 np0005481648.novalocal sudo[102261]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:41 np0005481648.novalocal sudo[102261]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:41 np0005481648.novalocal sudo[102264]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/client.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/client.cnf.txt Oct 12 14:53:41 np0005481648.novalocal sudo[102264]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:41 np0005481648.novalocal sudo[102264]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:41 np0005481648.novalocal sudo[102267]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/np0005481648.novalocal.pem /var/log/weirdo-project/logs/etc/my.cnf.d/np0005481648.novalocal.pem.txt Oct 12 14:53:41 np0005481648.novalocal sudo[102267]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:41 np0005481648.novalocal sudo[102267]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:41 np0005481648.novalocal sudo[102270]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/iscsi/iscsid.conf /var/log/weirdo-project/logs/etc/iscsi/iscsid.conf.txt Oct 12 14:53:41 np0005481648.novalocal sudo[102270]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:41 np0005481648.novalocal sudo[102270]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:41 np0005481648.novalocal sudo[102273]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/iscsi/initiatorname.iscsi /var/log/weirdo-project/logs/etc/iscsi/initiatorname.iscsi.txt Oct 12 14:53:41 np0005481648.novalocal sudo[102273]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:41 np0005481648.novalocal sudo[102273]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:41 np0005481648.novalocal sudo[102276]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu/networks/default.xml /var/log/weirdo-project/logs/etc/libvirt/qemu/networks/default.xml.txt Oct 12 14:53:41 np0005481648.novalocal sudo[102276]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:41 np0005481648.novalocal sudo[102276]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:41 np0005481648.novalocal sudo[102279]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu.conf /var/log/weirdo-project/logs/etc/libvirt/qemu.conf.txt Oct 12 14:53:41 np0005481648.novalocal sudo[102279]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:41 np0005481648.novalocal sudo[102279]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:41 np0005481648.novalocal sudo[102282]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtqemud.conf /var/log/weirdo-project/logs/etc/libvirt/virtqemud.conf.txt Oct 12 14:53:41 np0005481648.novalocal sudo[102282]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:41 np0005481648.novalocal sudo[102282]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:42 np0005481648.novalocal sudo[102285]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtsecretd.conf /var/log/weirdo-project/logs/etc/libvirt/virtsecretd.conf.txt Oct 12 14:53:42 np0005481648.novalocal sudo[102285]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:42 np0005481648.novalocal sudo[102285]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:42 np0005481648.novalocal sudo[102288]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirt-admin.conf /var/log/weirdo-project/logs/etc/libvirt/libvirt-admin.conf.txt Oct 12 14:53:42 np0005481648.novalocal sudo[102288]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:42 np0005481648.novalocal sudo[102288]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:42 np0005481648.novalocal sudo[102291]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirt.conf /var/log/weirdo-project/logs/etc/libvirt/libvirt.conf.txt Oct 12 14:53:42 np0005481648.novalocal sudo[102291]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:42 np0005481648.novalocal sudo[102291]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:42 np0005481648.novalocal sudo[102294]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtlockd.conf /var/log/weirdo-project/logs/etc/libvirt/virtlockd.conf.txt Oct 12 14:53:42 np0005481648.novalocal sudo[102294]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:42 np0005481648.novalocal sudo[102294]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:42 np0005481648.novalocal sudo[102297]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtlogd.conf /var/log/weirdo-project/logs/etc/libvirt/virtlogd.conf.txt Oct 12 14:53:42 np0005481648.novalocal sudo[102297]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:42 np0005481648.novalocal sudo[102297]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:42 np0005481648.novalocal sudo[102300]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtproxyd.conf /var/log/weirdo-project/logs/etc/libvirt/virtproxyd.conf.txt Oct 12 14:53:42 np0005481648.novalocal sudo[102300]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:42 np0005481648.novalocal sudo[102300]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:42 np0005481648.novalocal sudo[102303]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtstoraged.conf /var/log/weirdo-project/logs/etc/libvirt/virtstoraged.conf.txt Oct 12 14:53:42 np0005481648.novalocal sudo[102303]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:42 np0005481648.novalocal sudo[102303]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:42 np0005481648.novalocal sudo[102306]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirtd.conf /var/log/weirdo-project/logs/etc/libvirt/libvirtd.conf.txt Oct 12 14:53:42 np0005481648.novalocal sudo[102306]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:42 np0005481648.novalocal sudo[102306]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:42 np0005481648.novalocal sudo[102309]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtinterfaced.conf /var/log/weirdo-project/logs/etc/libvirt/virtinterfaced.conf.txt Oct 12 14:53:42 np0005481648.novalocal sudo[102309]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:42 np0005481648.novalocal sudo[102309]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:42 np0005481648.novalocal sudo[102312]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/network.conf /var/log/weirdo-project/logs/etc/libvirt/network.conf.txt Oct 12 14:53:42 np0005481648.novalocal sudo[102312]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:42 np0005481648.novalocal sudo[102312]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:42 np0005481648.novalocal sudo[102315]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnetworkd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnetworkd.conf.txt Oct 12 14:53:42 np0005481648.novalocal sudo[102315]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:42 np0005481648.novalocal sudo[102315]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:42 np0005481648.novalocal sudo[102318]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnodedevd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnodedevd.conf.txt Oct 12 14:53:42 np0005481648.novalocal sudo[102318]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:42 np0005481648.novalocal sudo[102318]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:42 np0005481648.novalocal sudo[102321]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnwfilterd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnwfilterd.conf.txt Oct 12 14:53:42 np0005481648.novalocal sudo[102321]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:42 np0005481648.novalocal sudo[102321]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:42 np0005481648.novalocal sudo[102324]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu-lockd.conf /var/log/weirdo-project/logs/etc/libvirt/qemu-lockd.conf.txt Oct 12 14:53:42 np0005481648.novalocal sudo[102324]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:42 np0005481648.novalocal sudo[102324]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:42 np0005481648.novalocal sudo[102327]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-privkey.pem.txt Oct 12 14:53:42 np0005481648.novalocal sudo[102327]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:42 np0005481648.novalocal sudo[102327]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:42 np0005481648.novalocal sudo[102330]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-privkey.pem.txt Oct 12 14:53:42 np0005481648.novalocal sudo[102330]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:42 np0005481648.novalocal sudo[102330]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:42 np0005481648.novalocal sudo[102333]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/default.conf /var/log/weirdo-project/logs/etc/openvswitch/default.conf.txt Oct 12 14:53:42 np0005481648.novalocal sudo[102333]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:42 np0005481648.novalocal sudo[102333]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:42 np0005481648.novalocal sudo[102336]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/.conf.db.~lock~ /var/log/weirdo-project/logs/etc/openvswitch/.conf.db.~lock~.txt Oct 12 14:53:42 np0005481648.novalocal sudo[102336]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:42 np0005481648.novalocal sudo[102336]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:42 np0005481648.novalocal sudo[102339]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/conf.db /var/log/weirdo-project/logs/etc/openvswitch/conf.db.txt Oct 12 14:53:42 np0005481648.novalocal sudo[102339]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:42 np0005481648.novalocal sudo[102339]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:42 np0005481648.novalocal sudo[102342]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/system-id.conf /var/log/weirdo-project/logs/etc/openvswitch/system-id.conf.txt Oct 12 14:53:42 np0005481648.novalocal sudo[102342]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:42 np0005481648.novalocal sudo[102342]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:42 np0005481648.novalocal sudo[102345]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-req.pem.txt Oct 12 14:53:42 np0005481648.novalocal sudo[102345]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:42 np0005481648.novalocal sudo[102345]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:42 np0005481648.novalocal sudo[102348]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-cert.pem.txt Oct 12 14:53:42 np0005481648.novalocal sudo[102348]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:42 np0005481648.novalocal sudo[102348]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:42 np0005481648.novalocal sudo[102351]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-req.pem.txt Oct 12 14:53:42 np0005481648.novalocal sudo[102351]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:42 np0005481648.novalocal sudo[102351]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:42 np0005481648.novalocal sudo[102354]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-cert.pem.txt Oct 12 14:53:42 np0005481648.novalocal sudo[102354]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:42 np0005481648.novalocal sudo[102354]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:42 np0005481648.novalocal sudo[102357]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-req.pem.txt Oct 12 14:53:42 np0005481648.novalocal sudo[102357]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:42 np0005481648.novalocal sudo[102357]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:42 np0005481648.novalocal sudo[102360]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-cert.pem.txt Oct 12 14:53:42 np0005481648.novalocal sudo[102360]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:42 np0005481648.novalocal sudo[102360]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:42 np0005481648.novalocal sudo[102363]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-privkey.pem.txt Oct 12 14:53:42 np0005481648.novalocal sudo[102363]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:42 np0005481648.novalocal sudo[102363]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:42 np0005481648.novalocal sudo[102366]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/httpd.conf /var/log/weirdo-project/logs/etc/httpd/conf/httpd.conf.txt Oct 12 14:53:42 np0005481648.novalocal sudo[102366]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:42 np0005481648.novalocal sudo[102366]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:42 np0005481648.novalocal sudo[102369]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/magic /var/log/weirdo-project/logs/etc/httpd/conf/magic.txt Oct 12 14:53:42 np0005481648.novalocal sudo[102369]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:42 np0005481648.novalocal sudo[102369]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:43 np0005481648.novalocal sudo[102372]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/ports.conf /var/log/weirdo-project/logs/etc/httpd/conf/ports.conf.txt Oct 12 14:53:43 np0005481648.novalocal sudo[102372]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:43 np0005481648.novalocal sudo[102372]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:43 np0005481648.novalocal sudo[102375]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-cinder_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-cinder_wsgi.conf.txt Oct 12 14:53:43 np0005481648.novalocal sudo[102375]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:43 np0005481648.novalocal sudo[102375]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:43 np0005481648.novalocal sudo[102378]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-glance_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-glance_wsgi.conf.txt Oct 12 14:53:43 np0005481648.novalocal sudo[102378]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:43 np0005481648.novalocal sudo[102378]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:43 np0005481648.novalocal sudo[102381]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-keystone_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-keystone_wsgi.conf.txt Oct 12 14:53:43 np0005481648.novalocal sudo[102381]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:43 np0005481648.novalocal sudo[102381]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:43 np0005481648.novalocal sudo[102384]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-manila_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-manila_wsgi.conf.txt Oct 12 14:53:43 np0005481648.novalocal sudo[102384]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:43 np0005481648.novalocal sudo[102384]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:43 np0005481648.novalocal sudo[102387]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-neutron_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-neutron_wsgi.conf.txt Oct 12 14:53:43 np0005481648.novalocal sudo[102387]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:43 np0005481648.novalocal sudo[102387]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:43 np0005481648.novalocal sudo[102390]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_api_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_api_wsgi.conf.txt Oct 12 14:53:43 np0005481648.novalocal sudo[102390]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:43 np0005481648.novalocal sudo[102390]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:43 np0005481648.novalocal sudo[102393]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_metadata_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_metadata_wsgi.conf.txt Oct 12 14:53:43 np0005481648.novalocal sudo[102393]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:43 np0005481648.novalocal sudo[102393]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:43 np0005481648.novalocal sudo[102396]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-octavia_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-octavia_wsgi.conf.txt Oct 12 14:53:43 np0005481648.novalocal sudo[102396]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:43 np0005481648.novalocal sudo[102396]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:43 np0005481648.novalocal sudo[102399]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-placement_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-placement_wsgi.conf.txt Oct 12 14:53:43 np0005481648.novalocal sudo[102399]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:43 np0005481648.novalocal sudo[102399]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:43 np0005481648.novalocal sudo[102402]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_ssl_vhost.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_ssl_vhost.conf.txt Oct 12 14:53:43 np0005481648.novalocal sudo[102402]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:43 np0005481648.novalocal sudo[102402]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:43 np0005481648.novalocal sudo[102405]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_vhost.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_vhost.conf.txt Oct 12 14:53:43 np0005481648.novalocal sudo[102405]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:43 np0005481648.novalocal sudo[102405]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:43 np0005481648.novalocal sudo[102408]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/openstack-dashboard.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/openstack-dashboard.conf.txt Oct 12 14:53:43 np0005481648.novalocal sudo[102408]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:43 np0005481648.novalocal sudo[102408]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:43 np0005481648.novalocal sudo[102411]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.conf.txt Oct 12 14:53:43 np0005481648.novalocal sudo[102411]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:43 np0005481648.novalocal sudo[102411]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:43 np0005481648.novalocal sudo[102414]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.load.txt Oct 12 14:53:43 np0005481648.novalocal sudo[102414]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:43 np0005481648.novalocal sudo[102414]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:43 np0005481648.novalocal sudo[102417]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_core.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_core.load.txt Oct 12 14:53:43 np0005481648.novalocal sudo[102417]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:43 np0005481648.novalocal sudo[102417]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:43 np0005481648.novalocal sudo[102420]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_host.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_host.load.txt Oct 12 14:53:43 np0005481648.novalocal sudo[102420]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:43 np0005481648.novalocal sudo[102420]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:43 np0005481648.novalocal sudo[102423]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/filter.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/filter.load.txt Oct 12 14:53:43 np0005481648.novalocal sudo[102423]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:43 np0005481648.novalocal sudo[102423]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:43 np0005481648.novalocal sudo[102426]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/log_config.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/log_config.load.txt Oct 12 14:53:43 np0005481648.novalocal sudo[102426]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:43 np0005481648.novalocal sudo[102426]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:43 np0005481648.novalocal sudo[102429]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.conf.txt Oct 12 14:53:43 np0005481648.novalocal sudo[102429]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:43 np0005481648.novalocal sudo[102429]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:43 np0005481648.novalocal sudo[102432]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.load.txt Oct 12 14:53:43 np0005481648.novalocal sudo[102432]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:43 np0005481648.novalocal sudo[102432]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:43 np0005481648.novalocal sudo[102435]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.conf.txt Oct 12 14:53:43 np0005481648.novalocal sudo[102435]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:43 np0005481648.novalocal sudo[102435]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:43 np0005481648.novalocal sudo[102438]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.load.txt Oct 12 14:53:43 np0005481648.novalocal sudo[102438]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:43 np0005481648.novalocal sudo[102438]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:43 np0005481648.novalocal sudo[102441]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.conf.txt Oct 12 14:53:43 np0005481648.novalocal sudo[102441]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:43 np0005481648.novalocal sudo[102441]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:43 np0005481648.novalocal sudo[102444]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.load.txt Oct 12 14:53:43 np0005481648.novalocal sudo[102444]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:43 np0005481648.novalocal sudo[102444]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:43 np0005481648.novalocal sudo[102447]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/socache_shmcb.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/socache_shmcb.load.txt Oct 12 14:53:43 np0005481648.novalocal sudo[102447]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:43 np0005481648.novalocal sudo[102447]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:43 np0005481648.novalocal sudo[102450]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.conf.txt Oct 12 14:53:43 np0005481648.novalocal sudo[102450]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:43 np0005481648.novalocal sudo[102450]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:43 np0005481648.novalocal sudo[102453]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.load.txt Oct 12 14:53:43 np0005481648.novalocal sudo[102453]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:43 np0005481648.novalocal sudo[102453]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:43 np0005481648.novalocal sudo[102456]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/systemd.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/systemd.load.txt Oct 12 14:53:43 np0005481648.novalocal sudo[102456]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:43 np0005481648.novalocal sudo[102456]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:43 np0005481648.novalocal sudo[102459]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/unixd.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/unixd.load.txt Oct 12 14:53:43 np0005481648.novalocal sudo[102459]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:43 np0005481648.novalocal sudo[102459]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:43 np0005481648.novalocal sudo[102462]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.conf.txt Oct 12 14:53:43 np0005481648.novalocal sudo[102462]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:43 np0005481648.novalocal sudo[102462]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:43 np0005481648.novalocal sudo[102465]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.load.txt Oct 12 14:53:43 np0005481648.novalocal sudo[102465]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:43 np0005481648.novalocal sudo[102465]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:43 np0005481648.novalocal sudo[102468]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/ssl/private/np0005481648.novalocal.pem /var/log/weirdo-project/logs/etc/redis/ssl/private/np0005481648.novalocal.pem.txt Oct 12 14:53:43 np0005481648.novalocal sudo[102468]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:43 np0005481648.novalocal sudo[102468]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:44 np0005481648.novalocal sudo[102471]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/redis.conf /var/log/weirdo-project/logs/etc/redis/redis.conf.txt Oct 12 14:53:44 np0005481648.novalocal sudo[102471]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:44 np0005481648.novalocal sudo[102471]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:44 np0005481648.novalocal sudo[102474]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/sentinel.conf.puppet /var/log/weirdo-project/logs/etc/redis/sentinel.conf.puppet.txt Oct 12 14:53:44 np0005481648.novalocal sudo[102474]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:44 np0005481648.novalocal sudo[102474]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:44 np0005481648.novalocal sudo[102477]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/redis.conf.puppet /var/log/weirdo-project/logs/etc/redis/redis.conf.puppet.txt Oct 12 14:53:44 np0005481648.novalocal sudo[102477]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:44 np0005481648.novalocal sudo[102477]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:44 np0005481648.novalocal sudo[102480]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/sentinel.conf /var/log/weirdo-project/logs/etc/redis/sentinel.conf.txt Oct 12 14:53:44 np0005481648.novalocal sudo[102480]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:44 np0005481648.novalocal sudo[102480]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:44 np0005481648.novalocal sudo[102483]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/.secret_key_store /var/log/weirdo-project/logs/etc/openstack-dashboard/.secret_key_store.txt Oct 12 14:53:44 np0005481648.novalocal sudo[102483]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:44 np0005481648.novalocal sudo[102483]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:44 np0005481648.novalocal sudo[102486]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt.txt Oct 12 14:53:44 np0005481648.novalocal sudo[102486]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:44 np0005481648.novalocal sudo[102486]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:44 np0005481648.novalocal sudo[102489]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/README.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/README.txt.txt Oct 12 14:53:44 np0005481648.novalocal sudo[102489]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:44 np0005481648.novalocal sudo[102489]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:44 np0005481648.novalocal sudo[102492]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/cinder.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/cinder.yaml.txt Oct 12 14:53:44 np0005481648.novalocal sudo[102492]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:44 np0005481648.novalocal sudo[102492]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:44 np0005481648.novalocal sudo[102495]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/glance.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/glance.yaml.txt Oct 12 14:53:44 np0005481648.novalocal sudo[102495]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:44 np0005481648.novalocal sudo[102495]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:44 np0005481648.novalocal sudo[102498]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/keystone.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/keystone.yaml.txt Oct 12 14:53:44 np0005481648.novalocal sudo[102498]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:44 np0005481648.novalocal sudo[102498]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:44 np0005481648.novalocal sudo[102501]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/neutron.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/neutron.yaml.txt Oct 12 14:53:44 np0005481648.novalocal sudo[102501]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:44 np0005481648.novalocal sudo[102501]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:44 np0005481648.novalocal sudo[102504]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/nova.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/nova.yaml.txt Oct 12 14:53:44 np0005481648.novalocal sudo[102504]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:44 np0005481648.novalocal sudo[102504]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:44 np0005481648.novalocal sudo[102507]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/manila.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/manila.yaml.txt Oct 12 14:53:44 np0005481648.novalocal sudo[102507]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:44 np0005481648.novalocal sudo[102507]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:44 np0005481648.novalocal sudo[102510]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt.txt Oct 12 14:53:44 np0005481648.novalocal sudo[102510]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:44 np0005481648.novalocal sudo[102510]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:44 np0005481648.novalocal sudo[102513]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt.txt Oct 12 14:53:44 np0005481648.novalocal sudo[102513]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:44 np0005481648.novalocal sudo[102513]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:44 np0005481648.novalocal sudo[102516]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt.txt Oct 12 14:53:44 np0005481648.novalocal sudo[102516]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:44 np0005481648.novalocal sudo[102516]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:44 np0005481648.novalocal sudo[102519]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_10_set_custom_theme.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_10_set_custom_theme.py.example.txt Oct 12 14:53:44 np0005481648.novalocal sudo[102519]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:44 np0005481648.novalocal sudo[102519]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:44 np0005481648.novalocal sudo[102522]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_11_toggle_angular_features.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_11_toggle_angular_features.py.example.txt Oct 12 14:53:44 np0005481648.novalocal sudo[102522]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:44 np0005481648.novalocal sudo[102522]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:44 np0005481648.novalocal sudo[102525]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_2010_integration_tests_deprecated.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_2010_integration_tests_deprecated.py.example.txt Oct 12 14:53:44 np0005481648.novalocal sudo[102525]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:44 np0005481648.novalocal sudo[102525]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:44 np0005481648.novalocal sudo[102528]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_20_integration_tests_scaffolds.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_20_integration_tests_scaffolds.py.example.txt Oct 12 14:53:44 np0005481648.novalocal sudo[102528]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:44 np0005481648.novalocal sudo[102528]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:44 np0005481648.novalocal sudo[102531]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_9030_profiler_settings.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_9030_profiler_settings.py.example.txt Oct 12 14:53:44 np0005481648.novalocal sudo[102531]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:44 np0005481648.novalocal sudo[102531]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:44 np0005481648.novalocal sudo[102534]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_90_manila_shares.py /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_90_manila_shares.py.txt Oct 12 14:53:44 np0005481648.novalocal sudo[102534]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:44 np0005481648.novalocal sudo[102534]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:44 np0005481648.novalocal sudo[102537]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt.txt Oct 12 14:53:44 np0005481648.novalocal sudo[102537]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:44 np0005481648.novalocal sudo[102537]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:44 np0005481648.novalocal sudo[102540]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt.txt Oct 12 14:53:44 np0005481648.novalocal sudo[102540]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:44 np0005481648.novalocal sudo[102540]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:44 np0005481648.novalocal sudo[102543]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt/api-extensions.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt/api-extensions.yaml.txt Oct 12 14:53:44 np0005481648.novalocal sudo[102543]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:44 np0005481648.novalocal sudo[102543]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:44 np0005481648.novalocal sudo[102546]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt.txt Oct 12 14:53:44 np0005481648.novalocal sudo[102546]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:44 np0005481648.novalocal sudo[102546]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:44 np0005481648.novalocal sudo[102549]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private/np0005481648.novalocal.pem /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private/np0005481648.novalocal.pem.txt Oct 12 14:53:44 np0005481648.novalocal sudo[102549]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:44 np0005481648.novalocal sudo[102549]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:44 np0005481648.novalocal sudo[102552]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyncd.conf /var/log/weirdo-project/logs/etc/rsyncd.conf.txt Oct 12 14:53:44 np0005481648.novalocal sudo[102552]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:44 np0005481648.novalocal sudo[102552]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:44 np0005481648.novalocal sudo[102555]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/centos-addons.repo /var/log/weirdo-project/logs/etc/yum.repos.d/centos-addons.repo.txt Oct 12 14:53:44 np0005481648.novalocal sudo[102555]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:45 np0005481648.novalocal sudo[102555]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:45 np0005481648.novalocal sudo[102558]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/centos.repo /var/log/weirdo-project/logs/etc/yum.repos.d/centos.repo.txt Oct 12 14:53:45 np0005481648.novalocal sudo[102558]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:45 np0005481648.novalocal sudo[102558]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:45 np0005481648.novalocal sudo[102561]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/delorean-deps.repo /var/log/weirdo-project/logs/etc/yum.repos.d/delorean-deps.repo.txt Oct 12 14:53:45 np0005481648.novalocal sudo[102561]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:45 np0005481648.novalocal sudo[102561]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:45 np0005481648.novalocal sudo[102564]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/delorean.repo /var/log/weirdo-project/logs/etc/yum.repos.d/delorean.repo.txt Oct 12 14:53:45 np0005481648.novalocal sudo[102564]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:45 np0005481648.novalocal sudo[102564]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:45 np0005481648.novalocal sudo[102567]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/redhat.repo /var/log/weirdo-project/logs/etc/yum.repos.d/redhat.repo.txt Oct 12 14:53:45 np0005481648.novalocal sudo[102567]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:45 np0005481648.novalocal sudo[102567]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:45 np0005481648.novalocal sudo[102570]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/CentOS-Messaging-rabbitmq.repo /var/log/weirdo-project/logs/etc/yum.repos.d/CentOS-Messaging-rabbitmq.repo.txt Oct 12 14:53:45 np0005481648.novalocal sudo[102570]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:45 np0005481648.novalocal sudo[102570]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:45 np0005481648.novalocal sudo[102573]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/passwd /var/log/weirdo-project/logs/etc/passwd.txt Oct 12 14:53:45 np0005481648.novalocal sudo[102573]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:45 np0005481648.novalocal sudo[102573]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:45 np0005481648.novalocal sudo[102576]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/group /var/log/weirdo-project/logs/etc/group.txt Oct 12 14:53:45 np0005481648.novalocal sudo[102576]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:45 np0005481648.novalocal sudo[102576]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:45 np0005481648.novalocal sudo[102579]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml.txt Oct 12 14:53:45 np0005481648.novalocal sudo[102579]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:45 np0005481648.novalocal sudo[102579]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:45 np0005481648.novalocal sudo[102582]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/fstab /var/log/weirdo-project/logs/etc/fstab.txt Oct 12 14:53:45 np0005481648.novalocal sudo[102582]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Oct 12 14:53:45 np0005481648.novalocal sudo[102582]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:45 np0005481648.novalocal sudo[99264]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:45 np0005481648.novalocal sudo[102696]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-kgzlyebhydnxzlososxdyyevqcjleppp ; /usr/bin/python3' Oct 12 14:53:45 np0005481648.novalocal sudo[102696]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:53:45 np0005481648.novalocal python3[102698]: ansible-command Invoked with creates=/var/log/weirdo/cpuinfo.txt _raw_params=cat /proc/cpuinfo >/var/log/weirdo/cpuinfo.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Oct 12 14:53:45 np0005481648.novalocal sudo[102696]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:45 np0005481648.novalocal sudo[102704]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-mmpbkmbzimivukmownpbehwhmnswcdqp ; /usr/bin/python3' Oct 12 14:53:45 np0005481648.novalocal sudo[102704]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:53:45 np0005481648.novalocal python3[102706]: ansible-command Invoked with creates=/var/log/weirdo/df.txt _raw_params=df -h >/var/log/weirdo/df.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Oct 12 14:53:45 np0005481648.novalocal sudo[102704]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:45 np0005481648.novalocal sudo[102713]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-hfcytxswsszqpeawqpdpqkkzghxftvjz ; /usr/bin/python3' Oct 12 14:53:45 np0005481648.novalocal sudo[102713]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:53:46 np0005481648.novalocal python3[102715]: ansible-command Invoked with creates=/var/log/weirdo/dmesg.txt _raw_params=dmesg -T >/var/log/weirdo/dmesg.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Oct 12 14:53:46 np0005481648.novalocal sudo[102713]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:46 np0005481648.novalocal sudo[102720]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-rzizoefcfbwniktprzvpcmcfznpolxpt ; /usr/bin/python3' Oct 12 14:53:46 np0005481648.novalocal sudo[102720]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:53:46 np0005481648.novalocal python3[102722]: ansible-command Invoked with creates=/var/log/weirdo/fdisk.txt _raw_params=fdisk -l >/var/log/weirdo/fdisk.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Oct 12 14:53:46 np0005481648.novalocal sudo[102720]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:46 np0005481648.novalocal sudo[102728]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-onssrcejadhctchwbqvfghohmutqznxg ; /usr/bin/python3' Oct 12 14:53:46 np0005481648.novalocal sudo[102728]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:53:46 np0005481648.novalocal python3[102730]: ansible-command Invoked with creates=/var/log/weirdo/getenforce.txt _raw_params=getenforce >/var/log/weirdo/getenforce.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Oct 12 14:53:46 np0005481648.novalocal sudo[102728]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:46 np0005481648.novalocal sudo[102735]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-kijcrncafhhexbaipzdvubmzljaudfby ; /usr/bin/python3' Oct 12 14:53:46 np0005481648.novalocal sudo[102735]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:53:46 np0005481648.novalocal python3[102737]: ansible-command Invoked with creates=/var/log/weirdo/hosts.txt _raw_params=cat /etc/hosts >/var/log/weirdo/hosts.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Oct 12 14:53:46 np0005481648.novalocal sudo[102735]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:47 np0005481648.novalocal sudo[102742]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ntzdrchonqeyucajvodlxtakrlwfncaq ; /usr/bin/python3' Oct 12 14:53:47 np0005481648.novalocal sudo[102742]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:53:47 np0005481648.novalocal python3[102744]: ansible-command Invoked with creates=/var/log/weirdo/ip.txt _raw_params=ip a >/var/log/weirdo/ip.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Oct 12 14:53:47 np0005481648.novalocal sudo[102742]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:47 np0005481648.novalocal sudo[102749]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-obbojlhuntunimrmqmgmlhtodeiqutns ; /usr/bin/python3' Oct 12 14:53:47 np0005481648.novalocal sudo[102749]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:53:47 np0005481648.novalocal python3[102751]: ansible-command Invoked with creates=/var/log/weirdo/iptables.txt _raw_params=iptables -vnL >/var/log/weirdo/iptables.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Oct 12 14:53:47 np0005481648.novalocal sudo[102749]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:47 np0005481648.novalocal sudo[102756]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-gjcjwynisnkydaehqnsbrpfhljwahknb ; /usr/bin/python3' Oct 12 14:53:47 np0005481648.novalocal sudo[102756]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:53:47 np0005481648.novalocal python3[102758]: ansible-command Invoked with creates=/var/log/weirdo/iptables_nat.txt _raw_params=iptables -vnL -t nat >/var/log/weirdo/iptables_nat.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Oct 12 14:53:47 np0005481648.novalocal sudo[102756]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:47 np0005481648.novalocal sudo[102763]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-rudfhiwvbggjhipnivfxfeibjpijrlnm ; /usr/bin/python3' Oct 12 14:53:47 np0005481648.novalocal sudo[102763]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:53:47 np0005481648.novalocal python3[102765]: ansible-command Invoked with creates=/var/log/weirdo/iptables_mangle.txt _raw_params=iptables -vnL -t mangle >/var/log/weirdo/iptables_mangle.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Oct 12 14:53:47 np0005481648.novalocal sudo[102763]: pam_unix(sudo:session): session closed for user root Oct 12 14:53:48 np0005481648.novalocal sudo[102770]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-nbriknjkswjbyfsunsgxpivfxcmkipfy ; /usr/bin/python3' Oct 12 14:53:48 np0005481648.novalocal sudo[102770]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Oct 12 14:53:48 np0005481648.novalocal python3[102772]: ansible-command Invoked with creates=/var/log/weirdo/journalctl.txt _raw_params=journalctl --no-pager >/var/log/weirdo/journalctl.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None