2026-01-27 00:32:10.476665 /usr/local/lib/python3.12/site-packages/debreach/__init__.py:6: DeprecationWarning: distutils Version classes are deprecated. Use packaging.version instead. 2026-01-27 00:32:10.476732 version_info = version.StrictVersion(__version__).version 2026-01-27 00:32:10.503754 DEBUG django.request MiddlewareNotUsed: 'openstack_dashboard.contrib.developer.profiler.middleware.ProfilerMiddleware' 2026-01-27 00:32:10.503856 DEBUG django.request MiddlewareNotUsed: 'openstack_dashboard.contrib.developer.profiler.middleware.ProfilerClientMiddleware' 2026-01-27 00:32:10.537037 DEBUG django.request MiddlewareNotUsed: 'horizon.middleware.OperationLogMiddleware' 2026-01-27 00:32:11.243562 DEBUG horizon.base Load condition failed for panel: identity_providers 2026-01-27 00:32:11.245670 DEBUG horizon.base Load condition failed for panel: mappings 2026-01-27 00:32:12.650407 /usr/local/lib/python3.12/site-packages/debreach/__init__.py:6: DeprecationWarning: distutils Version classes are deprecated. Use packaging.version instead. 2026-01-27 00:32:12.650444 version_info = version.StrictVersion(__version__).version 2026-01-27 00:32:12.672957 DEBUG django.request MiddlewareNotUsed: 'openstack_dashboard.contrib.developer.profiler.middleware.ProfilerMiddleware' 2026-01-27 00:32:12.673038 DEBUG django.request MiddlewareNotUsed: 'openstack_dashboard.contrib.developer.profiler.middleware.ProfilerClientMiddleware' 2026-01-27 00:32:12.680666 DEBUG django.request MiddlewareNotUsed: 'horizon.middleware.OperationLogMiddleware' 2026-01-27 00:32:13.035606 DEBUG horizon.base Load condition failed for panel: identity_providers 2026-01-27 00:32:13.035936 DEBUG horizon.base Load condition failed for panel: mappings 2026-01-27 00:32:14.073812 /usr/local/lib/python3.12/site-packages/debreach/__init__.py:6: DeprecationWarning: distutils Version classes are deprecated. Use packaging.version instead. 2026-01-27 00:32:14.073843 version_info = version.StrictVersion(__version__).version 2026-01-27 00:32:14.093317 DEBUG django.request MiddlewareNotUsed: 'openstack_dashboard.contrib.developer.profiler.middleware.ProfilerMiddleware' 2026-01-27 00:32:14.093393 DEBUG django.request MiddlewareNotUsed: 'openstack_dashboard.contrib.developer.profiler.middleware.ProfilerClientMiddleware' 2026-01-27 00:32:14.099183 DEBUG django.request MiddlewareNotUsed: 'horizon.middleware.OperationLogMiddleware' 2026-01-27 00:32:14.445198 DEBUG horizon.base Load condition failed for panel: identity_providers 2026-01-27 00:32:14.445616 DEBUG horizon.base Load condition failed for panel: mappings 2026-01-27 00:32:14.781908 DEBUG openstack_auth.backend Beginning user authentication 2026-01-27 00:32:14.782049 DEBUG openstack_auth.plugin.password Attempting to authenticate for tempest-TestDashboardBasicOps-1463611886-project-member 2026-01-27 00:32:14.782554 DEBUG keystoneauth.identity.v3.base Making authentication request to https://38.102.83.18/identity/v3/auth/tokens 2026-01-27 00:32:14.824201 DEBUG keystoneauth.identity.v3.base {"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "394b171d76ec4959a370f839cec964c2", "name": "tempest-TestDashboardBasicOps-1463611886-project-member", "password_expires_at": null}, "audit_ids": ["lyKbmsDRTEqGdlqo3Gheuw"], "expires_at": "2026-01-27T01:32:14.000000Z", "issued_at": "2026-01-27T00:32:14.000000Z"}} 2026-01-27 00:32:14.824500 DEBUG keystoneauth.identity.v3.base Making authentication request to https://38.102.83.18/identity/v3/auth/tokens 2026-01-27 00:32:14.852441 DEBUG keystoneauth.session Request returned failure status: 401 2026-01-27 00:32:14.852585 INFO openstack_auth.plugin.base Attempted scope to domain Default failed, will attempt to scope to another domain. 2026-01-27 00:32:14.853812 DEBUG keystoneauth.session REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.18/identity/v3/users/394b171d76ec4959a370f839cec964c2/projects? -H "Accept: application/json" -H "Forwarded: for=::1;by=python-keystoneclient" -H "User-Agent: python-keystoneclient" -H "X-Auth-Token: {SHA256}429cc703291d094391f85f2cc712f422610420eba7f290fcd145fbe9b38ede9f" 2026-01-27 00:32:14.889919 DEBUG keystoneauth.session RESP: [200] Connection: close Content-Length: 519 Content-Type: application/json Date: Tue, 27 Jan 2026 00:32:14 GMT Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12 Vary: X-Auth-Token x-openstack-request-id: req-4dba85aa-3176-4291-9f02-7e7652335458 2026-01-27 00:32:14.890096 DEBUG keystoneauth.session RESP BODY: {"projects": [{"id": "84d88df23667454aaa330b448fb42666", "name": "tempest-TestDashboardBasicOps-1463611886", "domain_id": "default", "description": "tempest-TestDashboardBasicOps-1463611886-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "https://38.102.83.18/identity/v3/projects/84d88df23667454aaa330b448fb42666"}}], "links": {"next": null, "self": "https://38.102.83.18/identity/v3/users/394b171d76ec4959a370f839cec964c2/projects", "previous": null}} 2026-01-27 00:32:14.890106 2026-01-27 00:32:14.890204 DEBUG keystoneauth.session GET call to identity for https://38.102.83.18/identity/v3/users/394b171d76ec4959a370f839cec964c2/projects used request id req-4dba85aa-3176-4291-9f02-7e7652335458 2026-01-27 00:32:14.890487 DEBUG keystoneauth.identity.v3.base Making authentication request to https://38.102.83.18/identity/v3/auth/tokens 2026-01-27 00:32:14.914699 DEBUG keystoneauth.identity.v3.base {"token": {"methods": ["token", "password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "394b171d76ec4959a370f839cec964c2", "name": "tempest-TestDashboardBasicOps-1463611886-project-member", "password_expires_at": null}, "audit_ids": ["ufRWqCOgSduJoxvhcWKnmg", "lyKbmsDRTEqGdlqo3Gheuw"], "expires_at": "2026-01-27T01:32:14.000000Z", "issued_at": "2026-01-27T00:32:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84d88df23667454aaa330b448fb42666", "name": "tempest-TestDashboardBasicOps-1463611886"}, "is_domain": false, "roles": [{"id": "8d097a02975947bda0a909b3675597a1", "name": "member"}, {"id": "a0d17cdf0cf84bafbe962f5ccf9db3a8", "name": "reader"}], "catalog": [{"endpoints": [{"id": "3f5faaccb55e48409b29245b27571ef4", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18/compute/v2.1", "region": "RegionOne"}], "id": "25cacd29f24c4cffbaf8e2f8be46d213", "type": "compute", "name": "nova"}, {"endpoints": [{"id": "41639d0e40c84215a179d9964616188a", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18/networking", "region": "RegionOne"}], "id": "261eef57899d469ea04cf187f2eb1b02", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "e4ec418b7d744267b8ae8c54c590db57", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18/compute/v2/84d88df23667454aaa330b448fb42666", "region": "RegionOne"}], "id": "ab290865e9b249fbaa99fb7268041024", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "794277011e0c4991bd88d7c2f503644a", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18/image", "region": "RegionOne"}], "id": "ac0a5656e1be4186adff9bbf864623ff", "type": "image", "name": "glance"}, {"endpoints": [{"id": "1f97087bf1544f24a43ea740f4ef9189", "interface": "admin", "region_id": "RegionOne", "url": "https://38.102.83.18:8080", "region": "RegionOne"}, {"id": "db2fc6e5897942f88dfce7f16f515785", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18:8080/v1/AUTH_84d88df23667454aaa330b448fb42666", "region": "RegionOne"}], "id": "bd9677dfb0a246b58f9f479e640a177f", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "79cb6f0108374e6dbbfbabd9c96b9b02", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18/identity", "region": "RegionOne"}], "id": "d615dc3ec97647d59f1d2dc04f637b95", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "b4a10bb747b94c0cb2e900c0ab46fd17", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18/volume/v3", "region": "RegionOne"}], "id": "e6cc2ee4fa9d4b17bc454bac2576c3c8", "type": "block-storage", "name": "cinder"}, {"endpoints": [{"id": "0b15f77822374e60bb2ce9ace7c6fccc", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18/placement", "region": "RegionOne"}], "id": "ef0f5eebff114d118646fed3f23d3661", "type": "placement", "name": "placement"}]}} 2026-01-27 00:32:14.916277 DEBUG openstack_auth.backend Authentication completed. 2026-01-27 00:32:14.916411 INFO openstack_auth.forms Login successful for user "tempest-TestDashboardBasicOps-1463611886-project-member" using domain "Default", remote address ::1. 2026-01-27 00:32:14.934977 DEBUG keystoneauth.session REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.18/identity -H "Accept: application/json" -H "User-Agent: python-novaclient keystoneauth1/5.13.0 python-requests/2.32.5 CPython/3.12.12" 2026-01-27 00:32:14.945156 DEBUG keystoneauth.session RESP: [300] Connection: close Content-Length: 272 Content-Type: application/json Date: Tue, 27 Jan 2026 00:32:14 GMT Location: https://38.102.83.18/identity/v3/ Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12 Vary: X-Auth-Token x-openstack-request-id: req-558f9169-4d7f-45df-817c-58ffc36cad60 2026-01-27 00:32:14.945228 DEBUG keystoneauth.session RESP BODY: {"versions": {"values": [{"id": "v3.14", "status": "stable", "updated": "2020-04-07T00:00:00Z", "links": [{"rel": "self", "href": "https://38.102.83.18/identity/v3/"}], "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}]}]}} 2026-01-27 00:32:14.945274 DEBUG keystoneauth.session GET call to https://38.102.83.18/identity used request id req-558f9169-4d7f-45df-817c-58ffc36cad60 2026-01-27 00:32:14.945464 DEBUG keystoneauth.identity.v3.base Making authentication request to https://38.102.83.18/identity/v3/auth/tokens 2026-01-27 00:32:14.978037 DEBUG keystoneauth.identity.v3.base {"token": {"methods": ["token", "password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "394b171d76ec4959a370f839cec964c2", "name": "tempest-TestDashboardBasicOps-1463611886-project-member", "password_expires_at": null}, "audit_ids": ["TJqm1ULPR4-G77I_q6WwVg", "lyKbmsDRTEqGdlqo3Gheuw"], "expires_at": "2026-01-27T01:32:14.000000Z", "issued_at": "2026-01-27T00:32:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84d88df23667454aaa330b448fb42666", "name": "tempest-TestDashboardBasicOps-1463611886"}, "is_domain": false, "roles": [{"id": "8d097a02975947bda0a909b3675597a1", "name": "member"}, {"id": "a0d17cdf0cf84bafbe962f5ccf9db3a8", "name": "reader"}], "catalog": [{"endpoints": [{"id": "3f5faaccb55e48409b29245b27571ef4", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18/compute/v2.1", "region": "RegionOne"}], "id": "25cacd29f24c4cffbaf8e2f8be46d213", "type": "compute", "name": "nova"}, {"endpoints": [{"id": "41639d0e40c84215a179d9964616188a", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18/networking", "region": "RegionOne"}], "id": "261eef57899d469ea04cf187f2eb1b02", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "e4ec418b7d744267b8ae8c54c590db57", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18/compute/v2/84d88df23667454aaa330b448fb42666", "region": "RegionOne"}], "id": "ab290865e9b249fbaa99fb7268041024", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "794277011e0c4991bd88d7c2f503644a", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18/image", "region": "RegionOne"}], "id": "ac0a5656e1be4186adff9bbf864623ff", "type": "image", "name": "glance"}, {"endpoints": [{"id": "1f97087bf1544f24a43ea740f4ef9189", "interface": "admin", "region_id": "RegionOne", "url": "https://38.102.83.18:8080", "region": "RegionOne"}, {"id": "db2fc6e5897942f88dfce7f16f515785", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18:8080/v1/AUTH_84d88df23667454aaa330b448fb42666", "region": "RegionOne"}], "id": "bd9677dfb0a246b58f9f479e640a177f", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "79cb6f0108374e6dbbfbabd9c96b9b02", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18/identity", "region": "RegionOne"}], "id": "d615dc3ec97647d59f1d2dc04f637b95", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "b4a10bb747b94c0cb2e900c0ab46fd17", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18/volume/v3", "region": "RegionOne"}], "id": "e6cc2ee4fa9d4b17bc454bac2576c3c8", "type": "block-storage", "name": "cinder"}, {"endpoints": [{"id": "0b15f77822374e60bb2ce9ace7c6fccc", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18/placement", "region": "RegionOne"}], "id": "ef0f5eebff114d118646fed3f23d3661", "type": "placement", "name": "placement"}]}} 2026-01-27 00:32:14.978483 DEBUG novaclient.v2.client REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.18/compute/v2.1 -H "Accept: application/json" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}62bbe361b38b5952e1ffa47e73627b8a8ed368b5663efba43b7483ab611312ec" 2026-01-27 00:32:14.990003 DEBUG novaclient.v2.client RESP: [200] Connection: close Content-Length: 391 Content-Type: application/json Date: Tue, 27 Jan 2026 00:32:14 GMT OpenStack-API-Version: compute 2.1 Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12 Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.1 x-compute-request-id: req-97713870-e324-4ae5-a952-f2d006d8d72b x-openstack-request-id: req-97713870-e324-4ae5-a952-f2d006d8d72b 2026-01-27 00:32:14.990184 DEBUG novaclient.v2.client RESP BODY: {"version": {"id": "v2.1", "status": "CURRENT", "version": "2.100", "min_version": "2.1", "updated": "2013-07-23T11:33:21Z", "links": [{"rel": "self", "href": "https://38.102.83.18/compute/v2.1/"}, {"rel": "describedby", "type": "text/html", "href": "http://docs.openstack.org/"}], "media-types": [{"base": "application/json", "type": "application/vnd.openstack.compute+json;version=2.1"}]}} 2026-01-27 00:32:14.990285 DEBUG novaclient.v2.client GET call to compute for https://38.102.83.18/compute/v2.1 used request id req-97713870-e324-4ae5-a952-f2d006d8d72b 2026-01-27 00:32:14.991917 DEBUG keystoneauth.session REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.18/identity -H "Accept: application/json" -H "User-Agent: python-novaclient keystoneauth1/5.13.0 python-requests/2.32.5 CPython/3.12.12" 2026-01-27 00:32:15.003255 DEBUG keystoneauth.session RESP: [300] Connection: close Content-Length: 272 Content-Type: application/json Date: Tue, 27 Jan 2026 00:32:14 GMT Location: https://38.102.83.18/identity/v3/ Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12 Vary: X-Auth-Token x-openstack-request-id: req-dc7e314d-4ce7-4682-8448-cd221ed8558e 2026-01-27 00:32:15.003401 DEBUG keystoneauth.session RESP BODY: {"versions": {"values": [{"id": "v3.14", "status": "stable", "updated": "2020-04-07T00:00:00Z", "links": [{"rel": "self", "href": "https://38.102.83.18/identity/v3/"}], "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}]}]}} 2026-01-27 00:32:15.003493 DEBUG keystoneauth.session GET call to https://38.102.83.18/identity used request id req-dc7e314d-4ce7-4682-8448-cd221ed8558e 2026-01-27 00:32:15.003838 DEBUG keystoneauth.identity.v3.base Making authentication request to https://38.102.83.18/identity/v3/auth/tokens 2026-01-27 00:32:15.020319 DEBUG keystoneauth.identity.v3.base {"token": {"methods": ["token", "password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "394b171d76ec4959a370f839cec964c2", "name": "tempest-TestDashboardBasicOps-1463611886-project-member", "password_expires_at": null}, "audit_ids": ["Jcx7-7NJRNi99UPUzuurcQ", "lyKbmsDRTEqGdlqo3Gheuw"], "expires_at": "2026-01-27T01:32:14.000000Z", "issued_at": "2026-01-27T00:32:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84d88df23667454aaa330b448fb42666", "name": "tempest-TestDashboardBasicOps-1463611886"}, "is_domain": false, "roles": [{"id": "8d097a02975947bda0a909b3675597a1", "name": "member"}, {"id": "a0d17cdf0cf84bafbe962f5ccf9db3a8", "name": "reader"}], "catalog": [{"endpoints": [{"id": "3f5faaccb55e48409b29245b27571ef4", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18/compute/v2.1", "region": "RegionOne"}], "id": "25cacd29f24c4cffbaf8e2f8be46d213", "type": "compute", "name": "nova"}, {"endpoints": [{"id": "41639d0e40c84215a179d9964616188a", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18/networking", "region": "RegionOne"}], "id": "261eef57899d469ea04cf187f2eb1b02", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "e4ec418b7d744267b8ae8c54c590db57", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18/compute/v2/84d88df23667454aaa330b448fb42666", "region": "RegionOne"}], "id": "ab290865e9b249fbaa99fb7268041024", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "794277011e0c4991bd88d7c2f503644a", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18/image", "region": "RegionOne"}], "id": "ac0a5656e1be4186adff9bbf864623ff", "type": "image", "name": "glance"}, {"endpoints": [{"id": "1f97087bf1544f24a43ea740f4ef9189", "interface": "admin", "region_id": "RegionOne", "url": "https://38.102.83.18:8080", "region": "RegionOne"}, {"id": "db2fc6e5897942f88dfce7f16f515785", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18:8080/v1/AUTH_84d88df23667454aaa330b448fb42666", "region": "RegionOne"}], "id": "bd9677dfb0a246b58f9f479e640a177f", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "79cb6f0108374e6dbbfbabd9c96b9b02", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18/identity", "region": "RegionOne"}], "id": "d615dc3ec97647d59f1d2dc04f637b95", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "b4a10bb747b94c0cb2e900c0ab46fd17", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18/volume/v3", "region": "RegionOne"}], "id": "e6cc2ee4fa9d4b17bc454bac2576c3c8", "type": "block-storage", "name": "cinder"}, {"endpoints": [{"id": "0b15f77822374e60bb2ce9ace7c6fccc", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18/placement", "region": "RegionOne"}], "id": "ef0f5eebff114d118646fed3f23d3661", "type": "placement", "name": "placement"}]}} 2026-01-27 00:32:15.020602 DEBUG novaclient.v2.client REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.18/compute/v2.1/os-simple-tenant-usage/84d88df23667454aaa330b448fb42666?start=2026-01-26T00:00:00&end=2026-01-27T23:59:59 -H "Accept: application/json" -H "OpenStack-API-Version: compute 2.40" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}dd5cc8a31bf64add4df3ca14bca98c5824689804cd7b23d0b018cd113ee78820" -H "X-OpenStack-Nova-API-Version: 2.40" 2026-01-27 00:32:15.150293 DEBUG novaclient.v2.client RESP: [200] Connection: close Content-Length: 20 Content-Type: application/json Date: Tue, 27 Jan 2026 00:32:15 GMT OpenStack-API-Version: compute 2.40 Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12 Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.40 x-compute-request-id: req-ed96f635-712c-4823-a17b-77cdefd62ac9 x-openstack-request-id: req-ed96f635-712c-4823-a17b-77cdefd62ac9 2026-01-27 00:32:15.150410 DEBUG novaclient.v2.client RESP BODY: {"tenant_usage": {}} 2026-01-27 00:32:15.150505 DEBUG novaclient.v2.client GET call to compute for https://38.102.83.18/compute/v2.1/os-simple-tenant-usage/84d88df23667454aaa330b448fb42666?start=2026-01-26T00:00:00&end=2026-01-27T23:59:59 used request id req-ed96f635-712c-4823-a17b-77cdefd62ac9 2026-01-27 00:32:15.163856 DEBUG keystoneauth.session REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.18/networking/v2.0/extensions -H "Accept: application/json" -H "Forwarded: for=::1;by=openstack keystoneauth1/5.13.0 python-requests/2.32.5 CPython/3.12.12" -H "User-Agent: openstack keystoneauth1/5.13.0 python-requests/2.32.5 CPython/3.12.12" -H "X-Auth-Token: {SHA256}84ae10cc964426b983725e955ea85cb7d7086a325882c6e61db9265ff55f9dc7" 2026-01-27 00:32:15.221348 DEBUG keystoneauth.session RESP: [200] Connection: close Content-Length: 14961 Content-Type: application/json Date: Tue, 27 Jan 2026 00:32:15 GMT Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12 x-openstack-request-id: req-b73c7907-3d66-482a-b503-fec37f3f4535 2026-01-27 00:32:15.222186 DEBUG keystoneauth.session RESP BODY: {"extensions": [{"name": "Address group", "alias": "address-group", "description": "Support address group", "updated": "2020-07-15T10:00:00-00:00", "links": []}, {"name": "Address scope", "alias": "address-scope", "description": "Address scopes extension.", "updated": "2015-07-26T10:00:00-00:00", "links": []}, {"name": "agent", "alias": "agent", "description": "The agent management extension.", "updated": "2013-02-03T10:00:00-00:00", "links": []}, {"name": "Allowed Address Pairs", "alias": "allowed-address-pairs", "description": "Provides allowed address pairs", "updated": "2013-07-23T10:00:00-00:00", "links": []}, {"name": "Auto Allocated Topology Services", "alias": "auto-allocated-topology", "description": "Auto Allocated Topology Services.", "updated": "2016-01-01T00:00:00-00:00", "links": []}, {"name": "Availability Zone", "alias": "availability_zone", "description": "The availability zone extension.", "updated": "2015-01-01T10:00:00-00:00", "links": []}, {"name": "Default Subnetpools", "alias": "default-subnetpools", "description": "Provides ability to mark and use a subnetpool as the default.", "updated": "2016-02-18T18:00:00-00:00", "links": []}, {"name": "DHCP Agent Scheduler", "alias": "dhcp_agent_scheduler", "description": "Schedule networks among dhcp agents", "updated": "2013-02-07T10:00:00-00:00", "links": []}, {"name": "DNS Integration", "alias": "dns-integration", "description": "Provides integration with DNS.", "updated": "2015-08-15T18:00:00-00:00", "links": []}, {"name": "dns_domain for ports", "alias": "dns-domain-ports", "description": "Allows the DNS domain to be specified for a network port.", "updated": "2017-04-24T10:00:00-00:00", "links": []}, {"name": "DNS domain names with keywords allowed", "alias": "dns-integration-domain-keywords", "description": "Allows to use keywords like , , and as DNS domain name", "updated": "2020-06-15T18:00:00-00:00", "links": []}, {"name": "Empty String Filtering Extension", "alias": "empty-string-filtering", "description": "Allow filtering by attributes with empty string value", "updated": "2018-05-01T10:00:00-00:00", "links": []}, {"name": "Neutron external network", "alias": "external-net", "description": "Adds external network attribute to network resource.", "updated": "2013-01-14T10:00:00-00:00", "links": []}, {"name": "Neutron Extra DHCP options", "alias": "extra_dhcp_opt", "description": "Extra options configuration for DHCP. For example PXE boot options to DHCP clients can be specified (e.g. tftp-server, server-ip-address, bootfile-name)", "updated": "2013-03-17T12:00:00-00:00", "links": []}, {"name": "Neutron Extra Route", "alias": "extraroute", "description": "Extra routes configuration for L3 router", "updated": "2013-02-01T10:00:00-00:00", "links": []}, {"name": "Atomically add/remove extra routes", "alias": "extraroute-atomic", "description": "Edit extra routes of a router on server side by atomically adding/removing extra routes", "updated": "2019-07-10T00:00:00+00:00", "links": []}, {"name": "Filter parameters validation", "alias": "filter-validation", "description": "Provides validation on filter parameters.", "updated": "2018-07-04T10:00:00-00:00", "links": []}, {"name": "Floating IP port forwarding detail", "alias": "floating-ip-port-forwarding-detail", "description": "Allow list floating ip return more port forwarding data, include'id' and 'internal_port_id'", "updated": "2022-05-06T10:00:00-00:00", "links": []}, {"name": "Floating IP Port Details Extension", "alias": "fip-port-details", "description": "Add port_details attribute to Floating IP resource", "updated": "2018-04-09T10:00:00-00:00", "links": []}, {"name": "Neutron Service Flavors", "alias": "flavors", "description": "Flavor specification for Neutron advanced services.", "updated": "2015-09-17T10:00:00-00:00", "links": []}, {"name": "Floating IP Pools Extension", "alias": "floatingip-pools", "description": "Provides a floating IP pools API.", "updated": "2018-03-21T10:00:00-00:00", "links": []}, {"name": "Neutron L3 Router", "alias": "router", "description": "Router abstraction for basic L3 forwarding between L2 Neutron networks and access to external networks via a NAT gateway.", "updated": "2012-07-20T10:00:00-00:00", "links": []}, {"name": "Enable Default Route BFD", "alias": "enable-default-route-bfd", "description": "Enables configurable BFD behavior for default routes", "updated": "2023-02-27T00:00:00-00:00", "links": []}, {"name": "Enable Default Route ECMP", "alias": "enable-default-route-ecmp", "description": "Enables configurable ECMP behavior for default routes", "updated": "2023-02-27T00:00:00-00:00", "links": []}, {"name": "Neutron L3 Configurable external gateway mode", "alias": "ext-gw-mode", "description": "Extension of the router abstraction for specifying whether SNAT should occur on the external gateway", "updated": "2013-03-28T10:00:00-00:00", "links": []}, {"name": "HA Router extension", "alias": "l3-ha", "description": "Adds HA capability to routers.", "updated": "2014-04-26T00:00:00-00:00", "links": []}, {"name": "Neutron L3 External Gateway Multihoming", "alias": "external-gateway-multihoming", "description": "Allow multiple external gateway ports per router", "updated": "2023-01-18T00:00:00-00:00", "links": []}, {"name": "Router Flavor Extension", "alias": "l3-flavors", "description": "Flavor support for routers.", "updated": "2016-05-17T00:00:00-00:00", "links": []}, {"name": "Multi Provider Network", "alias": "multi-provider", "description": "Expose mapping of virtual networks to multiple physical networks", "updated": "2013-06-27T10:00:00-00:00", "links": []}, {"name": "Network MTU", "alias": "net-mtu", "description": "Provides MTU attribute for a network resource.", "updated": "2015-03-25T10:00:00-00:00", "links": []}, {"name": "Network MTU (writable)", "alias": "net-mtu-writable", "description": "Provides a writable MTU attribute for a network resource.", "updated": "2017-07-12T00:00:00-00:00", "links": []}, {"name": "Network Availability Zone", "alias": "network_availability_zone", "description": "Availability zone support for network.", "updated": "2015-01-01T10:00:00-00:00", "links": []}, {"name": "Network IP Availability", "alias": "network-ip-availability", "description": "Provides IP availability data for each network and subnet.", "updated": "2015-09-24T00:00:00-00:00", "links": []}, {"name": "Pagination support", "alias": "pagination", "description": "Extension that indicates that pagination is enabled.", "updated": "2016-06-12T00:00:00-00:00", "links": []}, {"name": "Port device profile", "alias": "port-device-profile", "description": "Expose the port device profile (Cyborg)", "updated": "2020-12-17T10:00:00-00:00", "links": []}, {"name": "Neutron Port MAC address regenerate", "alias": "port-mac-address-regenerate", "description": "Network port MAC address regenerate", "updated": "2018-05-03T10:00:00-00:00", "links": []}, {"name": "Port NUMA affinity policy", "alias": "port-numa-affinity-policy", "description": "Expose the port NUMA affinity policy", "updated": "2020-07-08T10:00:00-00:00", "links": []}, {"name": "Port NUMA affinity policy \\"socket\\"", "alias": "port-numa-affinity-policy-socket", "description": "Adds \\"socket\\" to the supported port NUMA affinity policies", "updated": "2024-02-09T10:00:00-00:00", "links": []}, {"name": "Port Binding", "alias": "binding", "description": "Expose port bindings of a virtual port to external application", "updated": "2014-02-03T10:00:00-00:00", "links": []}, {"name": "Port Bindings Extended", "alias": "binding-extended", "description": "Expose port bindings of a virtual port to external application", "updated": "2017-07-17T10:00:00-00:00", "links": []}, {"name": "Port Security", "alias": "port-security", "description": "Provides port security", "updated": "2012-07-23T10:00:00-00:00", "links": []}, {"name": "project_id field enabled", "alias": "project-id", "description": "Extension that indicates that project_id field is enabled.", "updated": "2016-09-09T09:09:09-09:09", "links": []}, {"name": "Provid 2026-01-27 00:32:15.222304 DEBUG keystoneauth.session GET call to network for https://38.102.83.18/networking/v2.0/extensions used request id req-b73c7907-3d66-482a-b503-fec37f3f4535 2026-01-27 00:32:15.299683 DEBUG novaclient.v2.client REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.18/compute/v2.1/limits?reserved=1 -H "Accept: application/json" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}62bbe361b38b5952e1ffa47e73627b8a8ed368b5663efba43b7483ab611312ec" 2026-01-27 00:32:15.301533 WARNING neutronclient.v2_0.client The python binding code in neutronclient is deprecated in favor of OpenstackSDK, please use that as this will be removed in a future release. 2026-01-27 00:32:15.313947 DEBUG:stevedore._cache:reading /opt/stack/.cache/python-entrypoints/60d2256e5e23f3b9a87c8bf6495fad016105feb2912c358959dc688b1ba16f20 2026-01-27 00:32:15.317518 DEBUG cinderclient.client 2026-01-27 00:32:15.317657 REQ: curl -i https://38.102.83.18/volume/v3/limits?tenant_id=84d88df23667454aaa330b448fb42666 -X GET-H 'X-Auth-Token: {SHA1}1162f87f6fe9eba169e09743507d40cb3d81e138'-H 'X-Auth-Project-Id: 84d88df23667454aaa330b448fb42666'-H 'User-Agent: python-cinderclient'-H 'Accept: application/json'-H 'OpenStack-API-Version: volume 3.55' 2026-01-27 00:32:15.317758 2026-01-27 00:32:15.376037 DEBUG cinderclient.client RESP: [200] {'Date': 'Tue, 27 Jan 2026 00:32:15 GMT', 'Server': 'Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12', 'Content-Type': 'application/json', 'x-compute-request-id': 'req-d3e328b3-c1c3-4472-ac6b-166958620978', 'Content-Length': '302', 'OpenStack-API-Version': 'volume 3.55', 'Vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d3e328b3-c1c3-4472-ac6b-166958620978', 'Connection': 'close'} 2026-01-27 00:32:15.386224 RESP BODY: {"limits": {"rate": [], "absolute": {"maxTotalVolumes": 10, "maxTotalSnapshots": 10, "maxTotalVolumeGigabytes": 1000, "maxTotalBackups": 10, "maxTotalBackupGigabytes": 1000, "totalVolumesUsed": 0, "totalGigabytesUsed": 0, "totalSnapshotsUsed": 0, "totalBackupsUsed": 0, "totalBackupGigabytesUsed": 0}}} 2026-01-27 00:32:15.391334 2026-01-27 00:32:15.401610 DEBUG novaclient.v2.client RESP: [200] Connection: close Content-Length: 511 Content-Type: application/json Date: Tue, 27 Jan 2026 00:32:15 GMT OpenStack-API-Version: compute 2.1 Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12 Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.1 x-compute-request-id: req-0e08efdc-bbec-4912-8a72-19399639c9d0 x-openstack-request-id: req-0e08efdc-bbec-4912-8a72-19399639c9d0 2026-01-27 00:32:15.406862 DEBUG novaclient.v2.client RESP BODY: {"limits": {"rate": [], "absolute": {"maxTotalCores": 20, "maxPersonality": 5, "maxPersonalitySize": 10240, "maxTotalInstances": 10, "maxTotalKeypairs": 100, "maxServerMeta": 128, "maxImageMeta": 128, "maxTotalRAMSize": 51200, "maxServerGroups": 10, "maxServerGroupMembers": 10, "maxTotalFloatingIps": -1, "maxSecurityGroups": -1, "maxSecurityGroupRules": -1, "totalRAMUsed": 0, "totalCoresUsed": 0, "totalInstancesUsed": 0, "totalFloatingIpsUsed": 0, "totalSecurityGroupsUsed": 0, "totalServerGroupsUsed": 0}}} 2026-01-27 00:32:15.412039 DEBUG novaclient.v2.client GET call to compute for https://38.102.83.18/compute/v2.1/limits?reserved=1 used request id req-0e08efdc-bbec-4912-8a72-19399639c9d0 2026-01-27 00:32:15.730737 DEBUG:stevedore._cache:writing to /opt/stack/.cache/python-entrypoints/60d2256e5e23f3b9a87c8bf6495fad016105feb2912c358959dc688b1ba16f20 2026-01-27 00:32:15.736509 DEBUG neutronclient.client REQ: b'curl -i https://38.102.83.18/networking/v2.0/quotas/84d88df23667454aaa330b448fb42666/details -X GET -H "X-Auth-Token: {SHA256}84ae10cc964426b983725e955ea85cb7d7086a325882c6e61db9265ff55f9dc7" -H "User-Agent: python-neutronclient"' 2026-01-27 00:32:15.803012 DEBUG neutronclient.client RESP: 200 {'Date': 'Tue, 27 Jan 2026 00:32:15 GMT', 'Server': 'Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12', 'Content-Type': 'application/json', 'Content-Length': '507', 'x-openstack-request-id': 'req-06bec4ee-5fa8-4396-bb90-aeaa37083cdd', 'Connection': 'close'} {"quota": {"network": {"limit": 100, "used": 0, "reserved": 0}, "subnet": {"limit": 100, "used": 0, "reserved": 0}, "subnetpool": {"limit": -1, "used": 0, "reserved": 0}, "port": {"limit": 500, "used": 0, "reserved": 0}, "router": {"limit": 10, "used": 0, "reserved": 0}, "floatingip": {"limit": 50, "used": 0, "reserved": 0}, "rbac_policy": {"limit": 10, "used": 0, "reserved": 0}, "security_group": {"limit": 10, "used": 0, "reserved": 0}, "security_group_rule": {"limit": 100, "used": 0, "reserved": 0}}} 2026-01-27 00:32:15.803087 DEBUG neutronclient.client GET call to neutron for https://38.102.83.18/networking/v2.0/quotas/84d88df23667454aaa330b448fb42666/details used request id req-06bec4ee-5fa8-4396-bb90-aeaa37083cdd 2026-01-27 00:32:16.807350 DEBUG keystoneauth.session REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.18/identity/v3/users/394b171d76ec4959a370f839cec964c2/projects? -H "Accept: application/json" -H "User-Agent: python-keystoneclient" -H "X-Auth-Token: {SHA256}429cc703291d094391f85f2cc712f422610420eba7f290fcd145fbe9b38ede9f" 2026-01-27 00:32:16.826488 DEBUG keystoneauth.session RESP: [200] Connection: close Content-Length: 519 Content-Type: application/json Date: Tue, 27 Jan 2026 00:32:16 GMT Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12 Vary: X-Auth-Token x-openstack-request-id: req-2da99938-e9db-40a1-9e70-84ce77a54c3e 2026-01-27 00:32:16.826617 DEBUG keystoneauth.session RESP BODY: {"projects": [{"id": "84d88df23667454aaa330b448fb42666", "name": "tempest-TestDashboardBasicOps-1463611886", "domain_id": "default", "description": "tempest-TestDashboardBasicOps-1463611886-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "https://38.102.83.18/identity/v3/projects/84d88df23667454aaa330b448fb42666"}}], "links": {"next": null, "self": "https://38.102.83.18/identity/v3/users/394b171d76ec4959a370f839cec964c2/projects", "previous": null}} 2026-01-27 00:32:16.826624 2026-01-27 00:32:16.826683 DEBUG keystoneauth.session GET call to identity for https://38.102.83.18/identity/v3/users/394b171d76ec4959a370f839cec964c2/projects used request id req-2da99938-e9db-40a1-9e70-84ce77a54c3e 2026-01-27 00:32:16.860486 DEBUG oslo_policy.policy No default policy file present, picking the configured one: /opt/stack/horizon/openstack_dashboard/conf/keystone_policy.yaml. 2026-01-27 00:32:17.103994 DEBUG:stevedore.extension:found extension EntryPoint(name='http', value='oslo_policy._external:HttpCheck', group='oslo.policy.rule_checks') 2026-01-27 00:32:17.104441 DEBUG:stevedore.extension:found extension EntryPoint(name='https', value='oslo_policy._external:HttpsCheck', group='oslo.policy.rule_checks') 2026-01-27 00:32:17.123001 DEBUG oslo_policy._cache_handler Reloading cached file /opt/stack/horizon/openstack_dashboard/conf/keystone_policy.yaml 2026-01-27 00:32:17.248360 DEBUG oslo_policy.policy Reloaded policy file: /opt/stack/horizon/openstack_dashboard/conf/keystone_policy.yaml 2026-01-27 00:32:17.250499 DEBUG openstack_auth.policy adding enforcer for service: identity 2026-01-27 00:32:17.251515 DEBUG oslo_policy.policy No default policy file present, picking the configured one: /opt/stack/horizon/openstack_dashboard/conf/nova_policy.yaml. 2026-01-27 00:32:17.428116 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1591: DeprecationWarning: os_compute_api:os-flavor-extra-specs:index deprecated without deprecated_reason or deprecated_since. This will be an error in a future release 2026-01-27 00:32:17.428170 warnings.warn( 2026-01-27 00:32:17.433960 DEBUG oslo_policy._cache_handler Reloading cached file /opt/stack/horizon/openstack_dashboard/conf/nova_policy.yaml 2026-01-27 00:32:17.561265 DEBUG oslo_policy.policy Reloaded policy file: /opt/stack/horizon/openstack_dashboard/conf/nova_policy.yaml 2026-01-27 00:32:17.561576 DEBUG oslo_policy._cache_handler Reloading cached file /opt/stack/horizon/openstack_dashboard/conf/nova_policy.d/api-extensions.yaml 2026-01-27 00:32:17.562726 DEBUG oslo_policy.policy Reloaded policy file: /opt/stack/horizon/openstack_dashboard/conf/nova_policy.d/api-extensions.yaml 2026-01-27 00:32:17.564738 DEBUG openstack_auth.policy adding enforcer for service: compute 2026-01-27 00:32:17.565496 DEBUG oslo_policy.policy No default policy file present, picking the configured one: /opt/stack/horizon/openstack_dashboard/conf/cinder_policy.yaml. 2026-01-27 00:32:17.807350 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1591: DeprecationWarning: volume_extension:quotas:show deprecated without deprecated_reason or deprecated_since. This will be an error in a future release 2026-01-27 00:32:17.807382 warnings.warn( 2026-01-27 00:32:17.813537 DEBUG oslo_policy._cache_handler Reloading cached file /opt/stack/horizon/openstack_dashboard/conf/cinder_policy.yaml 2026-01-27 00:32:17.914122 DEBUG oslo_policy.policy Reloaded policy file: /opt/stack/horizon/openstack_dashboard/conf/cinder_policy.yaml 2026-01-27 00:32:17.916134 DEBUG openstack_auth.policy adding enforcer for service: volume 2026-01-27 00:32:17.916972 DEBUG oslo_policy.policy No default policy file present, picking the configured one: /opt/stack/horizon/openstack_dashboard/conf/glance_policy.yaml. 2026-01-27 00:32:17.974165 DEBUG oslo_policy._cache_handler Reloading cached file /opt/stack/horizon/openstack_dashboard/conf/glance_policy.yaml 2026-01-27 00:32:18.001549 DEBUG oslo_policy.policy Reloaded policy file: /opt/stack/horizon/openstack_dashboard/conf/glance_policy.yaml 2026-01-27 00:32:18.002255 DEBUG openstack_auth.policy adding enforcer for service: image 2026-01-27 00:32:18.002907 DEBUG oslo_policy.policy No default policy file present, picking the configured one: /opt/stack/horizon/openstack_dashboard/conf/neutron_policy.yaml. 2026-01-27 00:32:18.296999 DEBUG oslo_policy._cache_handler Reloading cached file /opt/stack/horizon/openstack_dashboard/conf/neutron_policy.yaml 2026-01-27 00:32:18.429123 DEBUG oslo_policy.policy Reloaded policy file: /opt/stack/horizon/openstack_dashboard/conf/neutron_policy.yaml 2026-01-27 00:32:18.432099 DEBUG openstack_auth.policy adding enforcer for service: network 2026-01-27 00:32:18.432448 DEBUG oslo_policy.policy enforce: rule="get_images" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.432541 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1133: UserWarning: Policy "get_images": "rule:context_is_admin or (role:reader and project_id:%(project_id)s)" failed scope check. The token used to make the request was domain scoped but the policy requires ['project'] scope. This behavior may change in the future where using the intended scope is required 2026-01-27 00:32:18.432545 warnings.warn(msg) 2026-01-27 00:32:18.433295 DEBUG oslo_policy.policy enforce: rule="os_compute_api:os-keypairs:index" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.433368 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1133: UserWarning: Policy "os_compute_api:os-keypairs:index": "(rule:context_is_admin) or user_id:%(user_id)s" failed scope check. The token used to make the request was domain scoped but the policy requires ['project'] scope. This behavior may change in the future where using the intended scope is required 2026-01-27 00:32:18.433371 warnings.warn(msg) 2026-01-27 00:32:18.433892 DEBUG oslo_policy.policy enforce: rule="os_compute_api:os-server-groups:index" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.433940 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1133: UserWarning: Policy "os_compute_api:os-server-groups:index": "rule:project_reader_or_admin" failed scope check. The token used to make the request was domain scoped but the policy requires ['project'] scope. This behavior may change in the future where using the intended scope is required 2026-01-27 00:32:18.433943 warnings.warn(msg) 2026-01-27 00:32:18.434543 DEBUG oslo_policy.policy enforce: rule="volume:get_all" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.435002 DEBUG oslo_policy.policy enforce: rule="backup:get_all" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.435445 DEBUG oslo_policy.policy enforce: rule="volume:get_all_snapshots" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.435891 DEBUG oslo_policy.policy enforce: rule="group:get_all" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.436347 DEBUG oslo_policy.policy enforce: rule="group:get_all" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.447551 DEBUG oslo_policy.policy enforce: rule="group:get_all_group_snapshots" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.448134 DEBUG oslo_policy.policy enforce: rule="group:get_all_group_snapshots" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.462419 DEBUG oslo_policy.policy enforce: rule="identity:list_projects" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.463342 DEBUG oslo_policy.policy enforce: rule="os_compute_api:os-hypervisors" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.463391 DEBUG oslo_policy.policy Rule [os_compute_api:os-hypervisors] does not exist 2026-01-27 00:32:18.463691 DEBUG oslo_policy.policy enforce: rule="default" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.463730 DEBUG oslo_policy.policy Rule [default] does not exist 2026-01-27 00:32:18.464098 DEBUG oslo_policy.policy enforce: rule="compute_extension:aggregates" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.464142 DEBUG oslo_policy.policy Rule [compute_extension:aggregates] does not exist 2026-01-27 00:32:18.464427 DEBUG oslo_policy.policy enforce: rule="default" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.464476 DEBUG oslo_policy.policy Rule [default] does not exist 2026-01-27 00:32:18.464792 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.465198 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.465571 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.466020 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.466322 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.466654 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.466970 DEBUG oslo_policy.policy enforce: rule="volume_extension:types_manage" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.467011 DEBUG oslo_policy.policy Rule [volume_extension:types_manage] does not exist 2026-01-27 00:32:18.467269 DEBUG oslo_policy.policy enforce: rule="default" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.467302 DEBUG oslo_policy.policy Rule [default] does not exist 2026-01-27 00:32:18.467596 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.467989 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.468325 DEBUG oslo_policy.policy enforce: rule="group:group_types_manage" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.468360 DEBUG oslo_policy.policy Rule [group:group_types_manage] does not exist 2026-01-27 00:32:18.468586 DEBUG oslo_policy.policy enforce: rule="default" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.468617 DEBUG oslo_policy.policy Rule [default] does not exist 2026-01-27 00:32:18.469166 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.469477 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.469847 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.470561 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.470938 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.471206 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.471528 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.471887 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.472178 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.472481 DEBUG oslo_policy.policy enforce: rule="admin_required" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.472796 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.473079 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.473379 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.473741 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.474062 DEBUG oslo_policy.policy enforce: rule="identity:get_domain" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.474681 DEBUG oslo_policy.policy enforce: rule="identity:list_domains" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.475283 DEBUG oslo_policy.policy enforce: rule="identity:list_projects" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.475879 DEBUG oslo_policy.policy enforce: rule="identity:list_user_projects" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.476574 DEBUG oslo_policy.policy enforce: rule="identity:get_user" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.477279 DEBUG oslo_policy.policy enforce: rule="identity:list_groups" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.478063 DEBUG oslo_policy.policy enforce: rule="identity:list_roles" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.478166 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1133: UserWarning: Policy "identity:list_roles": "rule:admin_required or (role:reader and system_scope:all)" failed scope check. The token used to make the request was domain scoped but the policy requires ['system', 'project'] scope. This behavior may change in the future where using the intended scope is required 2026-01-27 00:32:18.478170 warnings.warn(msg) 2026-01-27 00:32:18.478619 DEBUG openstack_dashboard.api.keystone Creating a new keystoneclient connection to https://38.102.83.18/identity/v3. 2026-01-27 00:32:18.481084 DEBUG keystoneauth.session REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.18/identity/v3 -H "Accept: application/json" -H "Forwarded: for=::1;by=openstack_dashboard keystoneauth1/5.13.0 python-requests/2.32.5 CPython/3.12.12" -H "User-Agent: openstack_dashboard keystoneauth1/5.13.0 python-requests/2.32.5 CPython/3.12.12" 2026-01-27 00:32:18.487759 DEBUG keystoneauth.session RESP: [200] Connection: close Content-Length: 257 Content-Type: application/json Date: Tue, 27 Jan 2026 00:32:18 GMT Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12 Vary: X-Auth-Token x-openstack-request-id: req-f07006bb-7a55-475f-8f83-498de5e50a9b 2026-01-27 00:32:18.487844 DEBUG keystoneauth.session RESP BODY: {"version": {"id": "v3.14", "status": "stable", "updated": "2020-04-07T00:00:00Z", "links": [{"rel": "self", "href": "https://38.102.83.18/identity/v3/"}], "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}]}} 2026-01-27 00:32:18.487968 DEBUG keystoneauth.session GET call to https://38.102.83.18/identity/v3 used request id req-f07006bb-7a55-475f-8f83-498de5e50a9b 2026-01-27 00:32:18.488427 DEBUG oslo_policy.policy enforce: rule="identity:list_credentials" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.488485 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1133: UserWarning: Policy "identity:list_credentials": "(role:reader and system_scope:all) or user_id:%(target.credential.user_id)s" failed scope check. The token used to make the request was domain scoped but the policy requires ['system', 'project'] scope. This behavior may change in the future where using the intended scope is required 2026-01-27 00:32:18.488489 warnings.warn(msg) 2026-01-27 00:32:18.489076 DEBUG oslo_policy.policy enforce: rule="identity:get_domain" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.489723 DEBUG oslo_policy.policy enforce: rule="identity:list_domains" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.490418 DEBUG oslo_policy.policy enforce: rule="identity:list_projects" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.491042 DEBUG oslo_policy.policy enforce: rule="identity:list_user_projects" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:18.552844 DEBUG keystoneauth.session REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.18/identity -H "Accept: application/json" -H "User-Agent: python-novaclient keystoneauth1/5.13.0 python-requests/2.32.5 CPython/3.12.12" 2026-01-27 00:32:18.563616 DEBUG keystoneauth.session RESP: [300] Connection: close Content-Length: 272 Content-Type: application/json Date: Tue, 27 Jan 2026 00:32:18 GMT Location: https://38.102.83.18/identity/v3/ Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12 Vary: X-Auth-Token x-openstack-request-id: req-855b497e-97da-4b7a-bb99-6f746a237f42 2026-01-27 00:32:18.563722 DEBUG keystoneauth.session RESP BODY: {"versions": {"values": [{"id": "v3.14", "status": "stable", "updated": "2020-04-07T00:00:00Z", "links": [{"rel": "self", "href": "https://38.102.83.18/identity/v3/"}], "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}]}]}} 2026-01-27 00:32:18.563825 DEBUG keystoneauth.session GET call to https://38.102.83.18/identity used request id req-855b497e-97da-4b7a-bb99-6f746a237f42 2026-01-27 00:32:18.564085 DEBUG keystoneauth.identity.v3.base Making authentication request to https://38.102.83.18/identity/v3/auth/tokens 2026-01-27 00:32:18.591347 DEBUG keystoneauth.identity.v3.base {"token": {"methods": ["token", "password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "394b171d76ec4959a370f839cec964c2", "name": "tempest-TestDashboardBasicOps-1463611886-project-member", "password_expires_at": null}, "audit_ids": ["x46XI-paR8ee9RWiMDBlhg", "lyKbmsDRTEqGdlqo3Gheuw"], "expires_at": "2026-01-27T01:32:14.000000Z", "issued_at": "2026-01-27T00:32:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84d88df23667454aaa330b448fb42666", "name": "tempest-TestDashboardBasicOps-1463611886"}, "is_domain": false, "roles": [{"id": "8d097a02975947bda0a909b3675597a1", "name": "member"}, {"id": "a0d17cdf0cf84bafbe962f5ccf9db3a8", "name": "reader"}], "catalog": [{"endpoints": [{"id": "3f5faaccb55e48409b29245b27571ef4", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18/compute/v2.1", "region": "RegionOne"}], "id": "25cacd29f24c4cffbaf8e2f8be46d213", "type": "compute", "name": "nova"}, {"endpoints": [{"id": "41639d0e40c84215a179d9964616188a", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18/networking", "region": "RegionOne"}], "id": "261eef57899d469ea04cf187f2eb1b02", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "e4ec418b7d744267b8ae8c54c590db57", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18/compute/v2/84d88df23667454aaa330b448fb42666", "region": "RegionOne"}], "id": "ab290865e9b249fbaa99fb7268041024", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "794277011e0c4991bd88d7c2f503644a", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18/image", "region": "RegionOne"}], "id": "ac0a5656e1be4186adff9bbf864623ff", "type": "image", "name": "glance"}, {"endpoints": [{"id": "1f97087bf1544f24a43ea740f4ef9189", "interface": "admin", "region_id": "RegionOne", "url": "https://38.102.83.18:8080", "region": "RegionOne"}, {"id": "db2fc6e5897942f88dfce7f16f515785", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18:8080/v1/AUTH_84d88df23667454aaa330b448fb42666", "region": "RegionOne"}], "id": "bd9677dfb0a246b58f9f479e640a177f", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "79cb6f0108374e6dbbfbabd9c96b9b02", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18/identity", "region": "RegionOne"}], "id": "d615dc3ec97647d59f1d2dc04f637b95", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "b4a10bb747b94c0cb2e900c0ab46fd17", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18/volume/v3", "region": "RegionOne"}], "id": "e6cc2ee4fa9d4b17bc454bac2576c3c8", "type": "block-storage", "name": "cinder"}, {"endpoints": [{"id": "0b15f77822374e60bb2ce9ace7c6fccc", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18/placement", "region": "RegionOne"}], "id": "ef0f5eebff114d118646fed3f23d3661", "type": "placement", "name": "placement"}]}} 2026-01-27 00:32:18.591858 DEBUG novaclient.v2.client REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.18/compute/v2.1 -H "Accept: application/json" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}2f0696ce32d6e1e8ef42171edeaf13a73077954a36de4d598e5e421e27122d63" 2026-01-27 00:32:18.603979 DEBUG novaclient.v2.client RESP: [200] Connection: close Content-Length: 391 Content-Type: application/json Date: Tue, 27 Jan 2026 00:32:18 GMT OpenStack-API-Version: compute 2.1 Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12 Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.1 x-compute-request-id: req-e7206179-cf0e-4419-b1a5-e49de8123a9b x-openstack-request-id: req-e7206179-cf0e-4419-b1a5-e49de8123a9b 2026-01-27 00:32:18.604085 DEBUG novaclient.v2.client RESP BODY: {"version": {"id": "v2.1", "status": "CURRENT", "version": "2.100", "min_version": "2.1", "updated": "2013-07-23T11:33:21Z", "links": [{"rel": "self", "href": "https://38.102.83.18/compute/v2.1/"}, {"rel": "describedby", "type": "text/html", "href": "http://docs.openstack.org/"}], "media-types": [{"base": "application/json", "type": "application/vnd.openstack.compute+json;version=2.1"}]}} 2026-01-27 00:32:18.604138 DEBUG novaclient.v2.client GET call to compute for https://38.102.83.18/compute/v2.1 used request id req-e7206179-cf0e-4419-b1a5-e49de8123a9b 2026-01-27 00:32:18.605017 DEBUG keystoneauth.session REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.18/identity -H "Accept: application/json" -H "User-Agent: python-novaclient keystoneauth1/5.13.0 python-requests/2.32.5 CPython/3.12.12" 2026-01-27 00:32:18.613336 DEBUG keystoneauth.session RESP: [300] Connection: close Content-Length: 272 Content-Type: application/json Date: Tue, 27 Jan 2026 00:32:18 GMT Location: https://38.102.83.18/identity/v3/ Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12 Vary: X-Auth-Token x-openstack-request-id: req-927e4480-8000-4295-9d98-37d419d4fe15 2026-01-27 00:32:18.613398 DEBUG keystoneauth.session RESP BODY: {"versions": {"values": [{"id": "v3.14", "status": "stable", "updated": "2020-04-07T00:00:00Z", "links": [{"rel": "self", "href": "https://38.102.83.18/identity/v3/"}], "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}]}]}} 2026-01-27 00:32:18.613439 DEBUG keystoneauth.session GET call to https://38.102.83.18/identity used request id req-927e4480-8000-4295-9d98-37d419d4fe15 2026-01-27 00:32:18.613593 DEBUG keystoneauth.identity.v3.base Making authentication request to https://38.102.83.18/identity/v3/auth/tokens 2026-01-27 00:32:18.636753 DEBUG keystoneauth.identity.v3.base {"token": {"methods": ["token", "password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "394b171d76ec4959a370f839cec964c2", "name": "tempest-TestDashboardBasicOps-1463611886-project-member", "password_expires_at": null}, "audit_ids": ["BLUKa9U4RZOF9wKK9ysEyw", "lyKbmsDRTEqGdlqo3Gheuw"], "expires_at": "2026-01-27T01:32:14.000000Z", "issued_at": "2026-01-27T00:32:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "84d88df23667454aaa330b448fb42666", "name": "tempest-TestDashboardBasicOps-1463611886"}, "is_domain": false, "roles": [{"id": "8d097a02975947bda0a909b3675597a1", "name": "member"}, {"id": "a0d17cdf0cf84bafbe962f5ccf9db3a8", "name": "reader"}], "catalog": [{"endpoints": [{"id": "3f5faaccb55e48409b29245b27571ef4", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18/compute/v2.1", "region": "RegionOne"}], "id": "25cacd29f24c4cffbaf8e2f8be46d213", "type": "compute", "name": "nova"}, {"endpoints": [{"id": "41639d0e40c84215a179d9964616188a", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18/networking", "region": "RegionOne"}], "id": "261eef57899d469ea04cf187f2eb1b02", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "e4ec418b7d744267b8ae8c54c590db57", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18/compute/v2/84d88df23667454aaa330b448fb42666", "region": "RegionOne"}], "id": "ab290865e9b249fbaa99fb7268041024", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "794277011e0c4991bd88d7c2f503644a", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18/image", "region": "RegionOne"}], "id": "ac0a5656e1be4186adff9bbf864623ff", "type": "image", "name": "glance"}, {"endpoints": [{"id": "1f97087bf1544f24a43ea740f4ef9189", "interface": "admin", "region_id": "RegionOne", "url": "https://38.102.83.18:8080", "region": "RegionOne"}, {"id": "db2fc6e5897942f88dfce7f16f515785", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18:8080/v1/AUTH_84d88df23667454aaa330b448fb42666", "region": "RegionOne"}], "id": "bd9677dfb0a246b58f9f479e640a177f", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "79cb6f0108374e6dbbfbabd9c96b9b02", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18/identity", "region": "RegionOne"}], "id": "d615dc3ec97647d59f1d2dc04f637b95", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "b4a10bb747b94c0cb2e900c0ab46fd17", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18/volume/v3", "region": "RegionOne"}], "id": "e6cc2ee4fa9d4b17bc454bac2576c3c8", "type": "block-storage", "name": "cinder"}, {"endpoints": [{"id": "0b15f77822374e60bb2ce9ace7c6fccc", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.18/placement", "region": "RegionOne"}], "id": "ef0f5eebff114d118646fed3f23d3661", "type": "placement", "name": "placement"}]}} 2026-01-27 00:32:18.636970 DEBUG novaclient.v2.client REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.18/compute/v2.1/os-simple-tenant-usage/84d88df23667454aaa330b448fb42666?start=2026-01-26T00:00:00&end=2026-01-27T23:59:59 -H "Accept: application/json" -H "OpenStack-API-Version: compute 2.40" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}31e511512b8d250154ce9f0752df7fc01051915839751f4629ea4a83940c8b8d" -H "X-OpenStack-Nova-API-Version: 2.40" 2026-01-27 00:32:18.722146 DEBUG novaclient.v2.client RESP: [200] Connection: close Content-Length: 20 Content-Type: application/json Date: Tue, 27 Jan 2026 00:32:18 GMT OpenStack-API-Version: compute 2.40 Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12 Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.40 x-compute-request-id: req-e89f36a3-002e-4bdb-ad4a-761fec2abe8f x-openstack-request-id: req-e89f36a3-002e-4bdb-ad4a-761fec2abe8f 2026-01-27 00:32:18.722261 DEBUG novaclient.v2.client RESP BODY: {"tenant_usage": {}} 2026-01-27 00:32:18.722331 DEBUG novaclient.v2.client GET call to compute for https://38.102.83.18/compute/v2.1/os-simple-tenant-usage/84d88df23667454aaa330b448fb42666?start=2026-01-26T00:00:00&end=2026-01-27T23:59:59 used request id req-e89f36a3-002e-4bdb-ad4a-761fec2abe8f 2026-01-27 00:32:18.729684 DEBUG keystoneauth.session REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.18/networking/v2.0/extensions -H "Accept: application/json" -H "Forwarded: for=::1;by=openstack keystoneauth1/5.13.0 python-requests/2.32.5 CPython/3.12.12" -H "User-Agent: openstack keystoneauth1/5.13.0 python-requests/2.32.5 CPython/3.12.12" -H "X-Auth-Token: {SHA256}84ae10cc964426b983725e955ea85cb7d7086a325882c6e61db9265ff55f9dc7" 2026-01-27 00:32:18.740569 DEBUG keystoneauth.session RESP: [200] Connection: close Content-Length: 14961 Content-Type: application/json Date: Tue, 27 Jan 2026 00:32:18 GMT Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12 x-openstack-request-id: req-f02d92b6-5a00-46cd-833b-134295c3ef38 2026-01-27 00:32:18.741241 DEBUG keystoneauth.session RESP BODY: {"extensions": [{"name": "Address group", "alias": "address-group", "description": "Support address group", "updated": "2020-07-15T10:00:00-00:00", "links": []}, {"name": "Address scope", "alias": "address-scope", "description": "Address scopes extension.", "updated": "2015-07-26T10:00:00-00:00", "links": []}, {"name": "agent", "alias": "agent", "description": "The agent management extension.", "updated": "2013-02-03T10:00:00-00:00", "links": []}, {"name": "Allowed Address Pairs", "alias": "allowed-address-pairs", "description": "Provides allowed address pairs", "updated": "2013-07-23T10:00:00-00:00", "links": []}, {"name": "Auto Allocated Topology Services", "alias": "auto-allocated-topology", "description": "Auto Allocated Topology Services.", "updated": "2016-01-01T00:00:00-00:00", "links": []}, {"name": "Availability Zone", "alias": "availability_zone", "description": "The availability zone extension.", "updated": "2015-01-01T10:00:00-00:00", "links": []}, {"name": "Default Subnetpools", "alias": "default-subnetpools", "description": "Provides ability to mark and use a subnetpool as the default.", "updated": "2016-02-18T18:00:00-00:00", "links": []}, {"name": "DHCP Agent Scheduler", "alias": "dhcp_agent_scheduler", "description": "Schedule networks among dhcp agents", "updated": "2013-02-07T10:00:00-00:00", "links": []}, {"name": "DNS Integration", "alias": "dns-integration", "description": "Provides integration with DNS.", "updated": "2015-08-15T18:00:00-00:00", "links": []}, {"name": "dns_domain for ports", "alias": "dns-domain-ports", "description": "Allows the DNS domain to be specified for a network port.", "updated": "2017-04-24T10:00:00-00:00", "links": []}, {"name": "DNS domain names with keywords allowed", "alias": "dns-integration-domain-keywords", "description": "Allows to use keywords like , , and as DNS domain name", "updated": "2020-06-15T18:00:00-00:00", "links": []}, {"name": "Empty String Filtering Extension", "alias": "empty-string-filtering", "description": "Allow filtering by attributes with empty string value", "updated": "2018-05-01T10:00:00-00:00", "links": []}, {"name": "Neutron external network", "alias": "external-net", "description": "Adds external network attribute to network resource.", "updated": "2013-01-14T10:00:00-00:00", "links": []}, {"name": "Neutron Extra DHCP options", "alias": "extra_dhcp_opt", "description": "Extra options configuration for DHCP. For example PXE boot options to DHCP clients can be specified (e.g. tftp-server, server-ip-address, bootfile-name)", "updated": "2013-03-17T12:00:00-00:00", "links": []}, {"name": "Neutron Extra Route", "alias": "extraroute", "description": "Extra routes configuration for L3 router", "updated": "2013-02-01T10:00:00-00:00", "links": []}, {"name": "Atomically add/remove extra routes", "alias": "extraroute-atomic", "description": "Edit extra routes of a router on server side by atomically adding/removing extra routes", "updated": "2019-07-10T00:00:00+00:00", "links": []}, {"name": "Filter parameters validation", "alias": "filter-validation", "description": "Provides validation on filter parameters.", "updated": "2018-07-04T10:00:00-00:00", "links": []}, {"name": "Floating IP port forwarding detail", "alias": "floating-ip-port-forwarding-detail", "description": "Allow list floating ip return more port forwarding data, include'id' and 'internal_port_id'", "updated": "2022-05-06T10:00:00-00:00", "links": []}, {"name": "Floating IP Port Details Extension", "alias": "fip-port-details", "description": "Add port_details attribute to Floating IP resource", "updated": "2018-04-09T10:00:00-00:00", "links": []}, {"name": "Neutron Service Flavors", "alias": "flavors", "description": "Flavor specification for Neutron advanced services.", "updated": "2015-09-17T10:00:00-00:00", "links": []}, {"name": "Floating IP Pools Extension", "alias": "floatingip-pools", "description": "Provides a floating IP pools API.", "updated": "2018-03-21T10:00:00-00:00", "links": []}, {"name": "Neutron L3 Router", "alias": "router", "description": "Router abstraction for basic L3 forwarding between L2 Neutron networks and access to external networks via a NAT gateway.", "updated": "2012-07-20T10:00:00-00:00", "links": []}, {"name": "Enable Default Route BFD", "alias": "enable-default-route-bfd", "description": "Enables configurable BFD behavior for default routes", "updated": "2023-02-27T00:00:00-00:00", "links": []}, {"name": "Enable Default Route ECMP", "alias": "enable-default-route-ecmp", "description": "Enables configurable ECMP behavior for default routes", "updated": "2023-02-27T00:00:00-00:00", "links": []}, {"name": "Neutron L3 Configurable external gateway mode", "alias": "ext-gw-mode", "description": "Extension of the router abstraction for specifying whether SNAT should occur on the external gateway", "updated": "2013-03-28T10:00:00-00:00", "links": []}, {"name": "HA Router extension", "alias": "l3-ha", "description": "Adds HA capability to routers.", "updated": "2014-04-26T00:00:00-00:00", "links": []}, {"name": "Neutron L3 External Gateway Multihoming", "alias": "external-gateway-multihoming", "description": "Allow multiple external gateway ports per router", "updated": "2023-01-18T00:00:00-00:00", "links": []}, {"name": "Router Flavor Extension", "alias": "l3-flavors", "description": "Flavor support for routers.", "updated": "2016-05-17T00:00:00-00:00", "links": []}, {"name": "Multi Provider Network", "alias": "multi-provider", "description": "Expose mapping of virtual networks to multiple physical networks", "updated": "2013-06-27T10:00:00-00:00", "links": []}, {"name": "Network MTU", "alias": "net-mtu", "description": "Provides MTU attribute for a network resource.", "updated": "2015-03-25T10:00:00-00:00", "links": []}, {"name": "Network MTU (writable)", "alias": "net-mtu-writable", "description": "Provides a writable MTU attribute for a network resource.", "updated": "2017-07-12T00:00:00-00:00", "links": []}, {"name": "Network Availability Zone", "alias": "network_availability_zone", "description": "Availability zone support for network.", "updated": "2015-01-01T10:00:00-00:00", "links": []}, {"name": "Network IP Availability", "alias": "network-ip-availability", "description": "Provides IP availability data for each network and subnet.", "updated": "2015-09-24T00:00:00-00:00", "links": []}, {"name": "Pagination support", "alias": "pagination", "description": "Extension that indicates that pagination is enabled.", "updated": "2016-06-12T00:00:00-00:00", "links": []}, {"name": "Port device profile", "alias": "port-device-profile", "description": "Expose the port device profile (Cyborg)", "updated": "2020-12-17T10:00:00-00:00", "links": []}, {"name": "Neutron Port MAC address regenerate", "alias": "port-mac-address-regenerate", "description": "Network port MAC address regenerate", "updated": "2018-05-03T10:00:00-00:00", "links": []}, {"name": "Port NUMA affinity policy", "alias": "port-numa-affinity-policy", "description": "Expose the port NUMA affinity policy", "updated": "2020-07-08T10:00:00-00:00", "links": []}, {"name": "Port NUMA affinity policy \\"socket\\"", "alias": "port-numa-affinity-policy-socket", "description": "Adds \\"socket\\" to the supported port NUMA affinity policies", "updated": "2024-02-09T10:00:00-00:00", "links": []}, {"name": "Port Binding", "alias": "binding", "description": "Expose port bindings of a virtual port to external application", "updated": "2014-02-03T10:00:00-00:00", "links": []}, {"name": "Port Bindings Extended", "alias": "binding-extended", "description": "Expose port bindings of a virtual port to external application", "updated": "2017-07-17T10:00:00-00:00", "links": []}, {"name": "Port Security", "alias": "port-security", "description": "Provides port security", "updated": "2012-07-23T10:00:00-00:00", "links": []}, {"name": "project_id field enabled", "alias": "project-id", "description": "Extension that indicates that project_id field is enabled.", "updated": "2016-09-09T09:09:09-09:09", "links": []}, {"name": "Provid 2026-01-27 00:32:18.741341 DEBUG keystoneauth.session GET call to network for https://38.102.83.18/networking/v2.0/extensions used request id req-f02d92b6-5a00-46cd-833b-134295c3ef38 2026-01-27 00:32:18.792540 DEBUG novaclient.v2.client REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.18/compute/v2.1/limits?reserved=1 -H "Accept: application/json" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}2f0696ce32d6e1e8ef42171edeaf13a73077954a36de4d598e5e421e27122d63" 2026-01-27 00:32:18.793100 WARNING neutronclient.v2_0.client The python binding code in neutronclient is deprecated in favor of OpenstackSDK, please use that as this will be removed in a future release. 2026-01-27 00:32:18.805953 DEBUG cinderclient.client 2026-01-27 00:32:18.806013 REQ: curl -i https://38.102.83.18/volume/v3/limits?tenant_id=84d88df23667454aaa330b448fb42666 -X GET-H 'X-Auth-Token: {SHA1}1162f87f6fe9eba169e09743507d40cb3d81e138'-H 'X-Auth-Project-Id: 84d88df23667454aaa330b448fb42666'-H 'User-Agent: python-cinderclient'-H 'Accept: application/json'-H 'OpenStack-API-Version: volume 3.55' 2026-01-27 00:32:18.806028 2026-01-27 00:32:18.811132 DEBUG:stevedore._cache:reading /opt/stack/.cache/python-entrypoints/60d2256e5e23f3b9a87c8bf6495fad016105feb2912c358959dc688b1ba16f20 2026-01-27 00:32:18.816804 DEBUG neutronclient.client REQ: b'curl -i https://38.102.83.18/networking/v2.0/quotas/84d88df23667454aaa330b448fb42666/details -X GET -H "X-Auth-Token: {SHA256}84ae10cc964426b983725e955ea85cb7d7086a325882c6e61db9265ff55f9dc7" -H "User-Agent: python-neutronclient"' 2026-01-27 00:32:18.849820 DEBUG cinderclient.client RESP: [200] {'Date': 'Tue, 27 Jan 2026 00:32:18 GMT', 'Server': 'Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12', 'Content-Type': 'application/json', 'x-compute-request-id': 'req-b0940182-7019-4c95-8bb0-538047d29426', 'Content-Length': '302', 'OpenStack-API-Version': 'volume 3.55', 'Vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b0940182-7019-4c95-8bb0-538047d29426', 'Connection': 'close'} 2026-01-27 00:32:18.849833 RESP BODY: {"limits": {"rate": [], "absolute": {"maxTotalVolumes": 10, "maxTotalSnapshots": 10, "maxTotalVolumeGigabytes": 1000, "maxTotalBackups": 10, "maxTotalBackupGigabytes": 1000, "totalVolumesUsed": 0, "totalGigabytesUsed": 0, "totalSnapshotsUsed": 0, "totalBackupsUsed": 0, "totalBackupGigabytesUsed": 0}}} 2026-01-27 00:32:18.849836 2026-01-27 00:32:18.860556 DEBUG novaclient.v2.client RESP: [200] Connection: close Content-Length: 511 Content-Type: application/json Date: Tue, 27 Jan 2026 00:32:18 GMT OpenStack-API-Version: compute 2.1 Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12 Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.1 x-compute-request-id: req-4da39a15-93cd-480a-a7c3-4c02c8265c78 x-openstack-request-id: req-4da39a15-93cd-480a-a7c3-4c02c8265c78 2026-01-27 00:32:18.860757 DEBUG novaclient.v2.client RESP BODY: {"limits": {"rate": [], "absolute": {"maxTotalCores": 20, "maxPersonality": 5, "maxPersonalitySize": 10240, "maxTotalInstances": 10, "maxTotalKeypairs": 100, "maxServerMeta": 128, "maxImageMeta": 128, "maxTotalRAMSize": 51200, "maxServerGroups": 10, "maxServerGroupMembers": 10, "maxTotalFloatingIps": -1, "maxSecurityGroups": -1, "maxSecurityGroupRules": -1, "totalRAMUsed": 0, "totalCoresUsed": 0, "totalInstancesUsed": 0, "totalFloatingIpsUsed": 0, "totalSecurityGroupsUsed": 0, "totalServerGroupsUsed": 0}}} 2026-01-27 00:32:18.860927 DEBUG novaclient.v2.client GET call to compute for https://38.102.83.18/compute/v2.1/limits?reserved=1 used request id req-4da39a15-93cd-480a-a7c3-4c02c8265c78 2026-01-27 00:32:18.869050 DEBUG neutronclient.client RESP: 200 {'Date': 'Tue, 27 Jan 2026 00:32:18 GMT', 'Server': 'Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12', 'Content-Type': 'application/json', 'Content-Length': '507', 'x-openstack-request-id': 'req-ef1565d6-a302-45f6-9369-ca85cd4daa84', 'Connection': 'close'} {"quota": {"network": {"limit": 100, "used": 0, "reserved": 0}, "subnet": {"limit": 100, "used": 0, "reserved": 0}, "subnetpool": {"limit": -1, "used": 0, "reserved": 0}, "port": {"limit": 500, "used": 0, "reserved": 0}, "router": {"limit": 10, "used": 0, "reserved": 0}, "floatingip": {"limit": 50, "used": 0, "reserved": 0}, "rbac_policy": {"limit": 10, "used": 0, "reserved": 0}, "security_group": {"limit": 10, "used": 0, "reserved": 0}, "security_group_rule": {"limit": 100, "used": 0, "reserved": 0}}} 2026-01-27 00:32:18.869154 DEBUG neutronclient.client GET call to neutron for https://38.102.83.18/networking/v2.0/quotas/84d88df23667454aaa330b448fb42666/details used request id req-ef1565d6-a302-45f6-9369-ca85cd4daa84 2026-01-27 00:32:19.880336 DEBUG keystoneauth.session REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.18/identity/v3/users/394b171d76ec4959a370f839cec964c2/projects? -H "Accept: application/json" -H "User-Agent: python-keystoneclient" -H "X-Auth-Token: {SHA256}429cc703291d094391f85f2cc712f422610420eba7f290fcd145fbe9b38ede9f" 2026-01-27 00:32:19.892847 DEBUG keystoneauth.session RESP: [200] Connection: close Content-Length: 519 Content-Type: application/json Date: Tue, 27 Jan 2026 00:32:19 GMT Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12 Vary: X-Auth-Token x-openstack-request-id: req-a3eb6c0e-0565-4450-8d09-4256845896df 2026-01-27 00:32:19.892928 DEBUG keystoneauth.session RESP BODY: {"projects": [{"id": "84d88df23667454aaa330b448fb42666", "name": "tempest-TestDashboardBasicOps-1463611886", "domain_id": "default", "description": "tempest-TestDashboardBasicOps-1463611886-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "https://38.102.83.18/identity/v3/projects/84d88df23667454aaa330b448fb42666"}}], "links": {"next": null, "self": "https://38.102.83.18/identity/v3/users/394b171d76ec4959a370f839cec964c2/projects", "previous": null}} 2026-01-27 00:32:19.892932 2026-01-27 00:32:19.892974 DEBUG keystoneauth.session GET call to identity for https://38.102.83.18/identity/v3/users/394b171d76ec4959a370f839cec964c2/projects used request id req-a3eb6c0e-0565-4450-8d09-4256845896df 2026-01-27 00:32:19.905722 DEBUG oslo_policy.policy No default policy file present, picking the configured one: /opt/stack/horizon/openstack_dashboard/conf/keystone_policy.yaml. 2026-01-27 00:32:20.117956 DEBUG:stevedore.extension:found extension EntryPoint(name='http', value='oslo_policy._external:HttpCheck', group='oslo.policy.rule_checks') 2026-01-27 00:32:20.118375 DEBUG:stevedore.extension:found extension EntryPoint(name='https', value='oslo_policy._external:HttpsCheck', group='oslo.policy.rule_checks') 2026-01-27 00:32:20.137246 DEBUG oslo_policy._cache_handler Reloading cached file /opt/stack/horizon/openstack_dashboard/conf/keystone_policy.yaml 2026-01-27 00:32:20.248817 DEBUG oslo_policy.policy Reloaded policy file: /opt/stack/horizon/openstack_dashboard/conf/keystone_policy.yaml 2026-01-27 00:32:20.251036 DEBUG openstack_auth.policy adding enforcer for service: identity 2026-01-27 00:32:20.251752 DEBUG oslo_policy.policy No default policy file present, picking the configured one: /opt/stack/horizon/openstack_dashboard/conf/nova_policy.yaml. 2026-01-27 00:32:20.410279 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1591: DeprecationWarning: os_compute_api:os-flavor-extra-specs:index deprecated without deprecated_reason or deprecated_since. This will be an error in a future release 2026-01-27 00:32:20.410302 warnings.warn( 2026-01-27 00:32:20.416634 DEBUG oslo_policy._cache_handler Reloading cached file /opt/stack/horizon/openstack_dashboard/conf/nova_policy.yaml 2026-01-27 00:32:20.541854 DEBUG oslo_policy.policy Reloaded policy file: /opt/stack/horizon/openstack_dashboard/conf/nova_policy.yaml 2026-01-27 00:32:20.542134 DEBUG oslo_policy._cache_handler Reloading cached file /opt/stack/horizon/openstack_dashboard/conf/nova_policy.d/api-extensions.yaml 2026-01-27 00:32:20.542743 DEBUG oslo_policy.policy Reloaded policy file: /opt/stack/horizon/openstack_dashboard/conf/nova_policy.d/api-extensions.yaml 2026-01-27 00:32:20.544801 DEBUG openstack_auth.policy adding enforcer for service: compute 2026-01-27 00:32:20.545479 DEBUG oslo_policy.policy No default policy file present, picking the configured one: /opt/stack/horizon/openstack_dashboard/conf/cinder_policy.yaml. 2026-01-27 00:32:20.701120 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1591: DeprecationWarning: volume_extension:quotas:show deprecated without deprecated_reason or deprecated_since. This will be an error in a future release 2026-01-27 00:32:20.701151 warnings.warn( 2026-01-27 00:32:20.707497 DEBUG oslo_policy._cache_handler Reloading cached file /opt/stack/horizon/openstack_dashboard/conf/cinder_policy.yaml 2026-01-27 00:32:20.801754 DEBUG oslo_policy.policy Reloaded policy file: /opt/stack/horizon/openstack_dashboard/conf/cinder_policy.yaml 2026-01-27 00:32:20.803666 DEBUG openstack_auth.policy adding enforcer for service: volume 2026-01-27 00:32:20.804435 DEBUG oslo_policy.policy No default policy file present, picking the configured one: /opt/stack/horizon/openstack_dashboard/conf/glance_policy.yaml. 2026-01-27 00:32:20.947398 DEBUG oslo_policy._cache_handler Reloading cached file /opt/stack/horizon/openstack_dashboard/conf/glance_policy.yaml 2026-01-27 00:32:20.973389 DEBUG oslo_policy.policy Reloaded policy file: /opt/stack/horizon/openstack_dashboard/conf/glance_policy.yaml 2026-01-27 00:32:20.974101 DEBUG openstack_auth.policy adding enforcer for service: image 2026-01-27 00:32:20.974878 DEBUG oslo_policy.policy No default policy file present, picking the configured one: /opt/stack/horizon/openstack_dashboard/conf/neutron_policy.yaml. 2026-01-27 00:32:21.273444 DEBUG oslo_policy._cache_handler Reloading cached file /opt/stack/horizon/openstack_dashboard/conf/neutron_policy.yaml 2026-01-27 00:32:21.405674 DEBUG oslo_policy.policy Reloaded policy file: /opt/stack/horizon/openstack_dashboard/conf/neutron_policy.yaml 2026-01-27 00:32:21.408670 DEBUG openstack_auth.policy adding enforcer for service: network 2026-01-27 00:32:21.409034 DEBUG oslo_policy.policy enforce: rule="get_images" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.409140 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1133: UserWarning: Policy "get_images": "rule:context_is_admin or (role:reader and project_id:%(project_id)s)" failed scope check. The token used to make the request was domain scoped but the policy requires ['project'] scope. This behavior may change in the future where using the intended scope is required 2026-01-27 00:32:21.409166 warnings.warn(msg) 2026-01-27 00:32:21.410013 DEBUG oslo_policy.policy enforce: rule="os_compute_api:os-keypairs:index" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.410104 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1133: UserWarning: Policy "os_compute_api:os-keypairs:index": "(rule:context_is_admin) or user_id:%(user_id)s" failed scope check. The token used to make the request was domain scoped but the policy requires ['project'] scope. This behavior may change in the future where using the intended scope is required 2026-01-27 00:32:21.410110 warnings.warn(msg) 2026-01-27 00:32:21.410661 DEBUG oslo_policy.policy enforce: rule="os_compute_api:os-server-groups:index" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.410708 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1133: UserWarning: Policy "os_compute_api:os-server-groups:index": "rule:project_reader_or_admin" failed scope check. The token used to make the request was domain scoped but the policy requires ['project'] scope. This behavior may change in the future where using the intended scope is required 2026-01-27 00:32:21.410711 warnings.warn(msg) 2026-01-27 00:32:21.411348 DEBUG oslo_policy.policy enforce: rule="volume:get_all" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.411872 DEBUG oslo_policy.policy enforce: rule="backup:get_all" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.412375 DEBUG oslo_policy.policy enforce: rule="volume:get_all_snapshots" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.412847 DEBUG oslo_policy.policy enforce: rule="group:get_all" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.413326 DEBUG oslo_policy.policy enforce: rule="group:get_all" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.424392 DEBUG oslo_policy.policy enforce: rule="group:get_all_group_snapshots" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.425012 DEBUG oslo_policy.policy enforce: rule="group:get_all_group_snapshots" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.436174 DEBUG oslo_policy.policy enforce: rule="identity:list_projects" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.437037 DEBUG oslo_policy.policy enforce: rule="os_compute_api:os-hypervisors" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.437086 DEBUG oslo_policy.policy Rule [os_compute_api:os-hypervisors] does not exist 2026-01-27 00:32:21.437359 DEBUG oslo_policy.policy enforce: rule="default" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.437396 DEBUG oslo_policy.policy Rule [default] does not exist 2026-01-27 00:32:21.437708 DEBUG oslo_policy.policy enforce: rule="compute_extension:aggregates" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.437745 DEBUG oslo_policy.policy Rule [compute_extension:aggregates] does not exist 2026-01-27 00:32:21.438121 DEBUG oslo_policy.policy enforce: rule="default" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.438171 DEBUG oslo_policy.policy Rule [default] does not exist 2026-01-27 00:32:21.438483 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.438922 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.439309 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.439689 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.440025 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.440336 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.440635 DEBUG oslo_policy.policy enforce: rule="volume_extension:types_manage" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.440673 DEBUG oslo_policy.policy Rule [volume_extension:types_manage] does not exist 2026-01-27 00:32:21.440975 DEBUG oslo_policy.policy enforce: rule="default" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.441013 DEBUG oslo_policy.policy Rule [default] does not exist 2026-01-27 00:32:21.441280 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.441576 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.441902 DEBUG oslo_policy.policy enforce: rule="group:group_types_manage" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.441941 DEBUG oslo_policy.policy Rule [group:group_types_manage] does not exist 2026-01-27 00:32:21.442167 DEBUG oslo_policy.policy enforce: rule="default" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.442197 DEBUG oslo_policy.policy Rule [default] does not exist 2026-01-27 00:32:21.442622 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.442944 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.443263 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.444024 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.444439 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.444711 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.445106 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.445471 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.445781 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.446095 DEBUG oslo_policy.policy enforce: rule="admin_required" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.446398 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.446685 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.447012 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.447366 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.447692 DEBUG oslo_policy.policy enforce: rule="identity:get_domain" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.448403 DEBUG oslo_policy.policy enforce: rule="identity:list_domains" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.449022 DEBUG oslo_policy.policy enforce: rule="identity:list_projects" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.449611 DEBUG oslo_policy.policy enforce: rule="identity:list_user_projects" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.450445 DEBUG oslo_policy.policy enforce: rule="identity:get_user" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.451173 DEBUG oslo_policy.policy enforce: rule="identity:list_groups" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.452514 DEBUG oslo_policy.policy enforce: rule="identity:list_roles" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.452618 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1133: UserWarning: Policy "identity:list_roles": "rule:admin_required or (role:reader and system_scope:all)" failed scope check. The token used to make the request was domain scoped but the policy requires ['system', 'project'] scope. This behavior may change in the future where using the intended scope is required 2026-01-27 00:32:21.452622 warnings.warn(msg) 2026-01-27 00:32:21.453084 DEBUG openstack_dashboard.api.keystone Creating a new keystoneclient connection to https://38.102.83.18/identity/v3. 2026-01-27 00:32:21.455499 DEBUG keystoneauth.session REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.18/identity/v3 -H "Accept: application/json" -H "Forwarded: for=::1;by=openstack_dashboard keystoneauth1/5.13.0 python-requests/2.32.5 CPython/3.12.12" -H "User-Agent: openstack_dashboard keystoneauth1/5.13.0 python-requests/2.32.5 CPython/3.12.12" 2026-01-27 00:32:21.463651 DEBUG keystoneauth.session RESP: [200] Connection: close Content-Length: 257 Content-Type: application/json Date: Tue, 27 Jan 2026 00:32:21 GMT Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12 Vary: X-Auth-Token x-openstack-request-id: req-5ac334db-131e-4065-bb99-c097a8c2de79 2026-01-27 00:32:21.463722 DEBUG keystoneauth.session RESP BODY: {"version": {"id": "v3.14", "status": "stable", "updated": "2020-04-07T00:00:00Z", "links": [{"rel": "self", "href": "https://38.102.83.18/identity/v3/"}], "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}]}} 2026-01-27 00:32:21.463780 DEBUG keystoneauth.session GET call to https://38.102.83.18/identity/v3 used request id req-5ac334db-131e-4065-bb99-c097a8c2de79 2026-01-27 00:32:21.464336 DEBUG oslo_policy.policy enforce: rule="identity:list_credentials" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.464401 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1133: UserWarning: Policy "identity:list_credentials": "(role:reader and system_scope:all) or user_id:%(target.credential.user_id)s" failed scope check. The token used to make the request was domain scoped but the policy requires ['system', 'project'] scope. This behavior may change in the future where using the intended scope is required 2026-01-27 00:32:21.464405 warnings.warn(msg) 2026-01-27 00:32:21.465058 DEBUG oslo_policy.policy enforce: rule="identity:get_domain" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.465693 DEBUG oslo_policy.policy enforce: rule="identity:list_domains" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.466314 DEBUG oslo_policy.policy enforce: rule="identity:list_projects" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"} 2026-01-27 00:32:21.466925 DEBUG oslo_policy.policy enforce: rule="identity:list_user_projects" creds={"domain_id": "default", "is_admin": false, "project_id": "84d88df23667454aaa330b448fb42666", "project_name": "tempest-TestDashboardBasicOps-1463611886", "roles": ["member", "reader"], "tenant_id": "84d88df23667454aaa330b448fb42666", "user_id": "394b171d76ec4959a370f839cec964c2", "username": "tempest-TestDashboardBasicOps-1463611886-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "84d88df23667454aaa330b448fb42666", "project_id": "84d88df23667454aaa330b448fb42666", "tenant_id": "84d88df23667454aaa330b448fb42666", "user.domain_id": "default", "user.id": "394b171d76ec4959a370f839cec964c2", "user_id": "394b171d76ec4959a370f839cec964c2"}