[WARNING]: Collection infra.leapp does not support Ansible version 2.14.18 [WARNING]: running playbook inside collection infra.leapp ansible-playbook [core 2.14.18] config file = /etc/ansible/ansible.cfg configured module search path = ['/root/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] ansible python module location = /usr/lib/python3.9/site-packages/ansible ansible collection location = /root/.ansible/collections:/usr/share/ansible/collections executable location = /usr/bin/ansible-playbook python version = 3.9.25 (main, Nov 10 2025, 00:00:00) [GCC 11.5.0 20240719 (Red Hat 11.5.0-11)] (/usr/bin/python3) jinja version = 3.1.2 libyaml = True Using /etc/ansible/ansible.cfg as config file Skipping callback 'default', as we already have a stdout callback. Skipping callback 'minimal', as we already have a stdout callback. Skipping callback 'oneline', as we already have a stdout callback. PLAYBOOK: tests_remediations_7to8.yml ****************************************** 1 plays in /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_remediations_7to8.yml PLAY [Test RHEL 7 to 8 remediations] ******************************************* TASK [Gathering Facts] ********************************************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_remediations_7to8.yml:2 ok: [managed-node01] TASK [Include tests_upgrade_custom playbook] *********************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_remediations_7to8.yml:22 included: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/tests_upgrade_custom.yml for managed-node01 TASK [tests_upgrade_custom | Check if leapp upgrade log exists] **************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/tests_upgrade_custom.yml:12 ok: [managed-node01] => {"changed": false, "stat": {"exists": false}} TASK [tests_upgrade_custom | Skip test if already upgraded or not RHEL {{ rhel_base_ver }}] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/tests_upgrade_custom.yml:17 META: end_play conditional evaluated to False, continuing play skipping: [managed-node01] => {"msg": "end_play", "skip_reason": "end_play conditional evaluated to False, continuing play"} TASK [tests_upgrade_custom | Include common upgrade tasks] ********************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/tests_upgrade_custom.yml:27 included: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml for managed-node01 TASK [common_upgrade_tasks | Gather setup tasks] ******************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:4 ok: [managed-node01 -> localhost] => {"changed": false, "examined": 1, "files": [{"atime": 1766073550.8229017, "ctime": 1766073550.665902, "dev": 51716, "gid": 0, "gr_name": "root", "inode": 125829260, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1766073550.665902, "nlink": 1, "path": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_cifs.yml", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 267, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}], "matched": 1, "msg": "All paths examined", "skipped_paths": {}} TASK [common_upgrade_tasks | Do setup tasks] *********************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:11 included: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_cifs.yml for managed-node01 => (item=/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_cifs.yml) TASK [setup | remediate_cifs | Add a CIFS share to /etc/fstab] ***************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_cifs.yml:3 changed: [managed-node01] => {"backup": "", "changed": true, "msg": "line added"} TASK [common_upgrade_tasks | Run first analysis] ******************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:21 [WARNING]: Collection community.general does not support Ansible version 2.14.18 TASK [infra.leapp.common : Log directory exists] ******************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:3 ok: [managed-node01] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/var/log/ripu", "secontext": "unconfined_u:object_r:var_log_t:s0", "size": 6, "state": "directory", "uid": 0} TASK [infra.leapp.common : Check for existing log file] ************************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:11 ok: [managed-node01] => {"changed": false, "stat": {"exists": false}} TASK [infra.leapp.common : Fail if log file already exists] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:16 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : Create new log file] ******************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:23 NOTIFIED HANDLER infra.leapp.common : Check for log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Add end time to log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Slurp ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Decode ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Rename log file for managed-node01 changed: [managed-node01] => {"changed": true, "checksum": "73f07f723cf9c319781e150cea8a179d16d3f815", "dest": "/var/log/ripu/ripu.log", "gid": 0, "group": "root", "md5sum": "6b6e2af066ea400a111a7fb9357ea0b7", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:var_log_t:s0", "size": 61, "src": "/root/.ansible/tmp/ansible-tmp-1766074055.8964975-8034-109346137321779/source", "state": "file", "uid": 0} TASK [infra.leapp.common : /etc/ansible/facts.d directory exists] ************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:35 ok: [managed-node01] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc/ansible/facts.d", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 57, "state": "directory", "uid": 0} TASK [infra.leapp.common : Capture current ansible_facts for validation after upgrade] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:43 changed: [managed-node01] => {"changed": true, "checksum": "baf19d8d9304edf70199e29e3af532cb32fe77f1", "dest": "/etc/ansible/facts.d/pre_ripu.fact", "gid": 0, "group": "root", "md5sum": "1a33ac067b0d46890c9cc30b3461f40b", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:etc_t:s0", "size": 11996, "src": "/root/.ansible/tmp/ansible-tmp-1766074057.2041328-8155-126316726728255/source", "state": "file", "uid": 0} TASK [infra.leapp.common : Capture a list of non-rhel versioned packages] ****** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:51 ok: [managed-node01] => {"changed": false, "cmd": "set -o pipefail; export PATH=$PATH; rpm -qa | grep -ve '[\\.|+]el7' | grep -vE '^(gpg-pubkey|libmodulemd|katello-ca-consumer)' | sort", "delta": "0:00:00.341939", "end": "2025-12-18 11:07:38.461092", "failed_when_result": false, "msg": "", "rc": 0, "start": "2025-12-18 11:07:38.119153", "stderr": "", "stderr_lines": [], "stdout": "epel-release-7-14.noarch\ntps-devel-2.44.50-1.noarch", "stdout_lines": ["epel-release-7-14.noarch", "tps-devel-2.44.50-1.noarch"]} TASK [infra.leapp.common : Create fact with the non-rhel versioned packages list] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:65 ok: [managed-node01] => {"ansible_facts": {"non_rhel_packages": ["epel-release-7-14.noarch", "tps-devel-2.44.50-1.noarch"]}, "changed": false} TASK [infra.leapp.common : Capture the list of non-rhel versioned packages in a separate fact file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:69 ok: [managed-node01] => {"changed": false, "checksum": "6d36b22d9c2b2f366fc090edfbac427c77d524a5", "dest": "/etc/ansible/facts.d/non_rhel_packages.fact", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/ansible/facts.d/non_rhel_packages.fact", "secontext": "system_u:object_r:etc_t:s0", "size": 58, "state": "file", "uid": 0} TASK [infra.leapp.analysis : Include tasks for preupg assistant analysis] ****** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:9 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : Include tasks for leapp preupgrade analysis] ****** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:13 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml for managed-node01 TASK [infra.leapp.analysis : analysis-leapp | Register to leapp activation key] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:2 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [analysis-leapp | Include custom_local_repos for local_repos_pre_leapp] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:14 TASK [infra.leapp.common : custom_local_repos | Remove old /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:2 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : custom_local_repos | Enable custom upgrade yum repositories] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:9 skipping: [managed-node01] => {"changed": false, "skipped_reason": "No items in the list"} TASK [infra.leapp.analysis : analysis-leapp | Install packages for preupgrade analysis on RHEL 7] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:22 ok: [managed-node01] => {"changed": false, "changes": {"installed": [], "updated": []}, "msg": "", "rc": 0, "results": ["All packages providing leapp-upgrade are up to date", ""]} TASK [infra.leapp.analysis : analysis-leapp | Install packages for preupgrade analysis on RHEL 8] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:29 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : analysis-leapp | Install packages for preupgrade analysis on RHEL 9] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:36 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : analysis-leapp | Ensure leapp log directory exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:43 ok: [managed-node01] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/var/log/leapp", "secontext": "system_u:object_r:var_log_t:s0", "size": 118, "state": "directory", "uid": 0} TASK [infra.leapp.analysis : analysis-leapp | Populate leapp_answers file] ***** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:51 changed: [managed-node01] => {"changed": true, "checksum": "3d934ad808576e3a7fb4c14a89645a4ad55ccf53", "dest": "/var/log/leapp/answerfile", "gid": 0, "group": "root", "md5sum": "01e375235c8e4cafdec593b260354063", "mode": "0644", "owner": "root", "secontext": "unconfined_u:object_r:var_log_t:s0", "size": 48, "src": "/root/.ansible/tmp/ansible-tmp-1766074063.1108496-8777-80301654675678/source", "state": "file", "uid": 0} TASK [analysis-leapp | Create /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:60 TASK [infra.leapp.common : custom_local_repos | Remove old /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:2 ok: [managed-node01] => {"changed": false, "path": "/etc/leapp/files/leapp_upgrade_repositories.repo", "state": "absent"} TASK [infra.leapp.common : custom_local_repos | Enable custom upgrade yum repositories] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:9 changed: [managed-node01] => (item={'name': 'rhel-8-for-x86_64-baseos-rpms', 'description': 'BaseOS for x86_64', 'baseurl': 'http://download.devel.redhat.com/rhel-8/nightly/updates/RHEL-8/latest-RHEL-8.10/compose/BaseOS/x86_64/os/', 'state': 'present'}) => {"ansible_loop_var": "item", "changed": true, "item": {"baseurl": "http://download.devel.redhat.com/rhel-8/nightly/updates/RHEL-8/latest-RHEL-8.10/compose/BaseOS/x86_64/os/", "description": "BaseOS for x86_64", "name": "rhel-8-for-x86_64-baseos-rpms", "state": "present"}, "repo": "rhel-8-for-x86_64-baseos-rpms", "state": "present"} changed: [managed-node01] => (item={'name': 'rhel-8-for-x86_64-appstream-rpms', 'description': 'AppStream for x86_64', 'baseurl': 'http://download.devel.redhat.com/rhel-8/nightly/updates/RHEL-8/latest-RHEL-8.10/compose/AppStream/x86_64/os/', 'state': 'present'}) => {"ansible_loop_var": "item", "changed": true, "item": {"baseurl": "http://download.devel.redhat.com/rhel-8/nightly/updates/RHEL-8/latest-RHEL-8.10/compose/AppStream/x86_64/os/", "description": "AppStream for x86_64", "name": "rhel-8-for-x86_64-appstream-rpms", "state": "present"}, "repo": "rhel-8-for-x86_64-appstream-rpms", "state": "present"} TASK [infra.leapp.analysis : analysis-leapp | Leapp preupgrade report] ********* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:71 ASYNC FAILED on managed-node01: jid=j828212174650.13743 changed: [managed-node01] => {"ansible_job_id": "j828212174650.13743", "changed": true, "cmd": "set -o pipefail; export PATH=$PATH; ulimit -n 16384; leapp preupgrade --report-schema=1.2.0 --no-rhsm 2>&1 | tee -a /var/log/ripu/ripu.log\n", "delta": "0:00:39.152189", "end": "2025-12-18 11:08:25.175958", "failed_when_result": false, "finished": 1, "msg": "non-zero return code", "rc": 1, "results_file": "/root/.ansible_async/j828212174650.13743", "start": "2025-12-18 11:07:46.023769", "started": 1, "stderr": "", "stderr_lines": [], "stdout": "\n============================================================\n UNSUPPORTED UPGRADE \n============================================================\n\nVariable LEAPP_UNSUPPORTED has been detected. Proceeding at your own risk.\nDevelopment variables have been detected:\n- LEAPP_DEVEL_RPMS_ALL_SIGNED=1\n\n============================================================\n UNSUPPORTED UPGRADE \n============================================================\n\n==> Processing phase `configuration_phase`\n====> * ipu_workflow_config\n IPU workflow config actor\n==> Processing phase `FactsCollection`\n====> * get_enabled_modules\n Provides data about which module streams are enabled on the source system.\n====> * system_facts\n Provides data about many facts from system.\n====> * scan_grub_config\n Scan grub configuration files for errors.\n====> * udevadm_info\n Produces data exported by the \"udevadm info\" command.\n====> * repository_mapping\n Produces message containing repository mapping based on provided file.\n====> * root_scanner\n Scan the system root directory and produce a message containing\n====> * scan_kernel_cmdline\n No documentation has been provided for the scan_kernel_cmdline actor.\n====> * rpm_scanner\n Provides data about installed RPM Packages.\nLoaded plugins: product-id, subscription-manager\n\nThis system is not registered with an entitlement server. You can use subscription-manager to register.\n\n====> * source_boot_loader_scanner\n Scans the boot loader configuration on the source system.\n====> * scanclienablerepo\n Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.\n====> * authselect_scanner\n Detect what authselect configuration should be suggested to administrator.\n====> * scan_systemd_source\n Provides info about systemd on the source system\n====> * sssd_facts\n Check SSSD configuration for changes in RHEL8 and report them in model.\n====> * scan_custom_modifications_actor\n Collects information about files in leapp directories that have been modified or newly added.\n====> * scan_files_for_target_userspace\n Scan the source system and identify files that will be copied into the target userspace when it is created.\n====> * scan_custom_repofile\n Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.\n====> * load_device_driver_deprecation_data\n Loads deprecation data for drivers and devices (PCI & CPU)\n====> * scan_source_files\n Scan files (explicitly specified) of the source system.\n====> * removed_pam_modules_scanner\n Scan PAM configuration for modules that are not available in RHEL-8.\n====> * common_leapp_dracut_modules\n Influences the generation of the initram disk\n====> * read_openssh_config\n Collect information about the OpenSSH configuration.\n====> * sctp_read_status\n Determines whether or not the SCTP kernel module might be wanted.\n====> * tcp_wrappers_config_read\n Parse tcp_wrappers configuration files /etc/hosts.{allow,deny}.\n====> * scan_fips\n Determine whether the source system has FIPS enabled.\n====> * register_yum_adjustment\n Registers a workaround which will adjust the yum directories during the upgrade.\n====> * pci_devices_scanner\n Provides data about existing PCI Devices.\n====> * copy_dnf_conf_into_target_userspace\n Copy dnf.conf into target userspace\n====> * selinuxcontentscanner\n Scan the system for any SELinux customizations\n====> * distribution_signed_rpm_scanner\n Provide data about distribution signed & unsigned RPM packages.\n====> * scanzfcp\n In case of s390x architecture, check whether ZFCP is used.\n====> * vsftpd_config_read\n Reads vsftpd configuration files (/etc/vsftpd/*.conf) and extracts necessary information.\n====> * scan_grub_device_name\n Find the name of the block devices where GRUB is located\n====> * scanmemory\n Scan Memory of the machine.\n====> * scan_subscription_manager_info\n Scans the current system for subscription manager information\n====> * used_repository_scanner\n Scan used enabled repositories\n====> * detect_kernel_drivers\n Matches all currently loaded kernel drivers against known deprecated and removed drivers.\n====> * storage_scanner\n Provides data about storage settings.\n====> * pam_modules_scanner\n Scan the pam directory for services and modules used in them\n====> * transaction_workarounds\n Provides additional RPM transaction tasks based on bundled RPM packages.\n====> * scan_pkg_manager\n Provides data about package manager (yum/dnf)\n====> * firewalld_facts_actor\n Provide data about firewalld\n====> * checkrhui\n Check if system is using RHUI infrastructure (on public cloud) and send messages to\n====> * scan_sap_hana\n Gathers information related to SAP HANA instances on the system.\n====> * check_grub_legacy\n Check whether GRUB Legacy is installed in the MBR.\n====> * scandasd\n In case of s390x architecture, check whether DASD is used.\n====> * scan_source_kernel\n Scan the source system kernel.\n====> * scan_target_os_image\n Scans the provided target OS ISO image to use as a content source for the IPU, if any.\n====> * satellite_upgrade_facts\n Report which Satellite packages require updates and how to handle PostgreSQL data\n====> * network_manager_read_config\n Provides data about NetworkManager configuration.\n====> * remove_obsolete_gpg_keys\n Remove obsoleted RPM GPG keys.\n====> * persistentnetnames\n Get network interface information for physical ethernet interfaces of the original system.\n====> * get_installed_desktops\n Actor checks if kde or gnome desktop environments\n====> * scancpu\n Scan CPUs of the machine.\n====> * trusted_gpg_keys_scanner\n Scan for trusted GPG keys.\n====> * repositories_blacklist\n Exclude target repositories provided by Red Hat without support.\n====> * biosdevname\n Enable biosdevname on the target RHEL system if all interfaces on the source RHEL\n====> * check_kde_apps\n Actor checks which KDE apps are installed.\n====> * rpm_transaction_config_tasks_collector\n Provides additional RPM transaction tasks from /etc/leapp/transaction.\n====> * ipa_scanner\n Scan system for ipa-client and ipa-server status\n====> * scan_grub_device_partition_layout\n Scan all identified GRUB devices for their partition layout.\n====> * quagga_daemons\n Active quagga daemons check.\n====> * multipath_conf_read\n Read multipath configuration files and extract the necessary information\n====> * scan_dynamic_linker_configuration\n Scan the dynamic linker configuration and find modifications.\n====> * cups_scanner\n Gather facts about CUPS features which needs to be migrated\n====> * spamassassin_config_read\n Reads spamc configuration (/etc/mail/spamassassin/spamc.conf), the\n====> * xfs_info_scanner\n This actor scans all mounted mountpoints for XFS information\n====> * persistentnetnamesdisable\n Disable systemd-udevd persistent network naming on machine with single eth0 NIC\n====> * pes_events_scanner\n Provides data about package events from Package Evolution Service.\n====> * setuptargetrepos\n Produces list of repositories that should be available to be used by Upgrade process.\n==> Processing phase `Checks`\n====> * open_ssh_algorithms\n OpenSSH configuration does not contain any unsupported cryptographic algorithms.\n====> * checkgrep\n Check if Grep is installed. If yes, write information about non-compatible changes.\n====> * python_inform_user\n This actor informs the user of differences in Python version and support in RHEL 8.\n====> * check_os_release\n Check if the current RHEL minor version is supported. If not, inhibit the upgrade process.\n====> * zipl_check_boot_entries\n Inhibits the upgrade if a problematic Zipl configuration is detected on the system.\n====> * check_btrfs\n Check if Btrfs filesystem is in use. If yes, inhibit the upgrade process.\n====> * open_ssh_use_privilege_separation\n UsePrivilegeSeparation configuration option was removed.\n====> * check_rhsmsku\n Ensure the system is subscribed to the subscription manager\n====> * postgresql_check\n Actor checking for presence of PostgreSQL installation.\n====> * check_kde_gnome\n Checks whether KDE is installed\n====> * checkmemory\n The actor check the size of RAM against RHEL8 minimal hardware requirements\n====> * check_detected_devices_and_drivers\n Checks whether or not detected devices and drivers are usable on the target system.\n====> * check_root_symlinks\n Check if the symlinks /bin and /lib are relative, not absolute.\n====> * openssh_permit_root_login\n OpenSSH no longer allows root logins with password.\n====> * check_firewalld\n Check for certain firewalld configuration that may prevent an upgrade.\n====> * check_ipa_server\n Check for ipa-server and inhibit upgrade\n====> * detect_grub_config_error\n Check grub configuration for various errors.\n====> * check_systemd_broken_symlinks\n Check whether some systemd symlinks are broken\n====> * check_system_arch\n Check if system is running at a supported architecture. If no, inhibit the upgrade process.\n====> * checkirssi\n Check if irssi is installed. If yes, write information about non-compatible changes.\n====> * cups_check\n Reports changes in configuration between CUPS 1.6.3 and 2.2.6\n====> * cephvolumescan\n Retrieves the list of encrypted Ceph OSD\n====> * check_skipped_repositories\n Produces a report if any repositories enabled on the system are going to be skipped.\n====> * multiple_package_versions\n Check for problematic 32bit packages installed together with 64bit ones.\n====> * sssd_check\n Check SSSD configuration for changes in RHEL8 and report them.\n====> * check_grub_core\n Check whether we are on legacy (BIOS) system and instruct Leapp to upgrade GRUB core\n====> * check_consumed_assets\n Check whether Leapp is using correct data assets.\n====> * quagga_report\n Checking for babeld on RHEL-7.\n====> * check_yum_plugins_enabled\n Checks that the required yum plugins are enabled.\n====> * check_boot_avail_space\n Check if at least 100Mib of available space on /boot. If not, inhibit the upgrade process.\n====> * bacula_check\n Actor checking for presence of Bacula installation.\n====> * check_nfs\n Check if NFS filesystem is in use. If yes, inhibit the upgrade process.\n====> * spamassassin_config_check\n Reports changes in spamassassin between RHEL-7 and RHEL-8\n====> * check_wireshark\n Report a couple of changes in tshark usage\n====> * removed_pam_modules\n Check for modules that are not available in RHEL 8 anymore\n====> * check_mount_options\n Check for mount options preventing the upgrade.\n====> * check_insights_auto_register\n Checks if system can be automatically registered into Red Hat Insights\n====> * vsftpd_config_check\n Checks whether the vsftpd configuration is supported in RHEL-8. Namely checks that\n====> * check_etc_releasever\n Check releasever info and provide a guidance based on the facts\n====> * removed_pam_modules_check\n Check if it is all right to disable PAM modules that are not in RHEL-8.\n====> * check_openssl_conf\n Check whether the openssl configuration and openssl-IBMCA.\n====> * sctp_checks\n Parses collected SCTP information and take necessary actions.\n====> * check_fips\n Inhibit upgrade if FIPS is detected as enabled.\n====> * checktargetrepos\n Check whether target yum repositories are specified.\n====> * check_docker\n Checks if Docker is installed and warns about its deprecation in RHEL8.\n====> * check_custom_modifications_actor\n Checks CustomModifications messages and produces a report about files in leapp directories that have been\n====> * check_brltty\n Check if brltty is installed, check whether configuration update is needed.\n====> * check_ntp\n Check if ntp and/or ntpdate configuration needs to be migrated.\n====> * check_target_iso\n Check that the provided target ISO is a valid ISO image and is located on a persistent partition.\n====> * check_sap_hana\n If SAP HANA has been detected, several checks are performed to ensure a successful upgrade.\n====> * enable_device_cio_free_service\n Enables device_cio_free.service systemd service on s390x\n====> * powertop\n Check if PowerTOP is installed. If yes, write information about non-compatible changes.\n====> * check_fstab_mount_order\n Checks order of entries in /etc/fstab based on their mount point and inhibits upgrade if overshadowing is detected.\n====> * checkhybridimage\n Check if the system is using Azure hybrid image.\n====> * open_ssh_deprecated_directives_check\n Check for any deprecated directives in the OpenSSH configuration.\n====> * checkfstabxfsoptions\n Check the FSTAB file for the deprecated / removed XFS mount options.\n====> * tcp_wrappers_check\n Check the list of packages previously compiled with TCP wrappers support\n====> * check_memcached\n Check for incompatible changes in memcached configuration.\n====> * check_chrony\n Check for incompatible changes in chrony configuration.\n====> * check_installed_debug_kernels\n Inhibit IPU (in-place upgrade) when multiple debug kernels are installed.\n====> * checkdosfstools\n Check if dosfstools is installed. If yes, write information about non-compatible changes.\n====> * checkacpid\n Check if acpid is installed. If yes, write information about non-compatible changes.\n====> * check_installed_devel_kernels\n Inhibit IPU (in-place upgrade) when multiple devel kernels are installed.\n====> * unsupported_upgrade_check\n Checks environment variables and produces a warning report if the upgrade is unsupported.\n====> * check_cifs\n Check if CIFS filesystem is in use. If yes, inhibit the upgrade process.\n====> * multipath_conf_check\n Checks whether the multipath configuration can be updated to RHEL-8 and\n====> * authselect_check\n Confirm suggested authselect call from AuthselectScanner.\n====> * check_bind\n Actor parsing BIND configuration and checking for known issues in it.\n====> * check_sendmail\n Check if sendmail is installed, check whether configuration update is needed, inhibit upgrade if TCP wrappers\n====> * check_postfix\n Check if postfix is installed, check whether configuration update is needed.\n====> * check_dynamic_linker_configuration\n Check for customization of dynamic linker configuration.\n====> * check_rpm_transaction_events\n Filter RPM transaction events based on installed RPM packages\n====> * check_installed_kernels\n Inhibit IPU (in-place upgrade) when installed kernels conflict with a safe upgrade.\n====> * efi_check_boot\n Adjust EFI boot entry for first reboot\n====> * satellite_upgrade_check\n Check state of Satellite system before upgrade\n====> * check_first_partition_offset\n Check whether the first partition starts at the offset >=1MiB.\n====> * check_removed_envvars\n Check for usage of removed environment variables and inhibit the upgrade\n====> * open_ssh_protocol\n Protocol configuration option was removed.\n====> * red_hat_signed_rpm_check\n Check if there are packages not signed by Red Hat in use. If yes, warn user about it.\n====> * check_ha_cluster\n Check if HA Cluster is in use. If yes, inhibit the upgrade process.\n====> * check_persistent_mounts\n Check if mounts required to be persistent are mounted in persistent fashion.\n====> * check_se_linux\n Check SELinux status and produce decision messages for further action.\n====> * check_luks_and_inhibit\n Check if any encrypted partitions is in use. If yes, inhibit the upgrade process.\n====> * check_skip_phase\n Skip all the subsequent phases until the report phase.\n==> Processing phase `Reports`\n====> * verify_check_results\n Check all dialogs and notify that user needs to make some choices.\n====> * verify_check_results\n Check all generated results messages and notify user about them.\n\nDebug output written to /var/log/leapp/leapp-preupgrade.log\n\n============================================================\n REPORT OVERVIEW \n============================================================\n\nUpgrade has been inhibited due to the following problems:\n 1. Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\n 2. Use of NFS detected. Upgrade can't proceed\n 3. Use of CIFS detected. Upgrade can't proceed\n\nHIGH and MEDIUM severity reports:\n 1. Packages available in excluded repositories will not be installed\n 2. Difference in Python versions and support in RHEL 8\n 3. GRUB2 core will be automatically updated during the upgrade\n 4. Upgrade is unsupported\n 5. Module pam_pkcs11 will be removed from PAM configuration\n 6. chrony using default configuration\n\nReports summary:\n Errors: 0\n Inhibitors: 3\n HIGH severity reports: 4\n MEDIUM severity reports: 2\n LOW severity reports: 5\n INFO severity reports: 3\n\nBefore continuing, review the full report below for details about discovered problems and possible remediation instructions:\n A report has been generated at /var/log/leapp/leapp-report.txt\n A report has been generated at /var/log/leapp/leapp-report.json\n\n============================================================\n END OF REPORT OVERVIEW \n============================================================\n\nAnswerfile has been generated at /var/log/leapp/answerfile", "stdout_lines": ["", "============================================================", " UNSUPPORTED UPGRADE ", "============================================================", "", "Variable LEAPP_UNSUPPORTED has been detected. Proceeding at your own risk.", "Development variables have been detected:", "- LEAPP_DEVEL_RPMS_ALL_SIGNED=1", "", "============================================================", " UNSUPPORTED UPGRADE ", "============================================================", "", "==> Processing phase `configuration_phase`", "====> * ipu_workflow_config", " IPU workflow config actor", "==> Processing phase `FactsCollection`", "====> * get_enabled_modules", " Provides data about which module streams are enabled on the source system.", "====> * system_facts", " Provides data about many facts from system.", "====> * scan_grub_config", " Scan grub configuration files for errors.", "====> * udevadm_info", " Produces data exported by the \"udevadm info\" command.", "====> * repository_mapping", " Produces message containing repository mapping based on provided file.", "====> * root_scanner", " Scan the system root directory and produce a message containing", "====> * scan_kernel_cmdline", " No documentation has been provided for the scan_kernel_cmdline actor.", "====> * rpm_scanner", " Provides data about installed RPM Packages.", "Loaded plugins: product-id, subscription-manager", "", "This system is not registered with an entitlement server. You can use subscription-manager to register.", "", "====> * source_boot_loader_scanner", " Scans the boot loader configuration on the source system.", "====> * scanclienablerepo", " Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.", "====> * authselect_scanner", " Detect what authselect configuration should be suggested to administrator.", "====> * scan_systemd_source", " Provides info about systemd on the source system", "====> * sssd_facts", " Check SSSD configuration for changes in RHEL8 and report them in model.", "====> * scan_custom_modifications_actor", " Collects information about files in leapp directories that have been modified or newly added.", "====> * scan_files_for_target_userspace", " Scan the source system and identify files that will be copied into the target userspace when it is created.", "====> * scan_custom_repofile", " Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.", "====> * load_device_driver_deprecation_data", " Loads deprecation data for drivers and devices (PCI & CPU)", "====> * scan_source_files", " Scan files (explicitly specified) of the source system.", "====> * removed_pam_modules_scanner", " Scan PAM configuration for modules that are not available in RHEL-8.", "====> * common_leapp_dracut_modules", " Influences the generation of the initram disk", "====> * read_openssh_config", " Collect information about the OpenSSH configuration.", "====> * sctp_read_status", " Determines whether or not the SCTP kernel module might be wanted.", "====> * tcp_wrappers_config_read", " Parse tcp_wrappers configuration files /etc/hosts.{allow,deny}.", "====> * scan_fips", " Determine whether the source system has FIPS enabled.", "====> * register_yum_adjustment", " Registers a workaround which will adjust the yum directories during the upgrade.", "====> * pci_devices_scanner", " Provides data about existing PCI Devices.", "====> * copy_dnf_conf_into_target_userspace", " Copy dnf.conf into target userspace", "====> * selinuxcontentscanner", " Scan the system for any SELinux customizations", "====> * distribution_signed_rpm_scanner", " Provide data about distribution signed & unsigned RPM packages.", "====> * scanzfcp", " In case of s390x architecture, check whether ZFCP is used.", "====> * vsftpd_config_read", " Reads vsftpd configuration files (/etc/vsftpd/*.conf) and extracts necessary information.", "====> * scan_grub_device_name", " Find the name of the block devices where GRUB is located", "====> * scanmemory", " Scan Memory of the machine.", "====> * scan_subscription_manager_info", " Scans the current system for subscription manager information", "====> * used_repository_scanner", " Scan used enabled repositories", "====> * detect_kernel_drivers", " Matches all currently loaded kernel drivers against known deprecated and removed drivers.", "====> * storage_scanner", " Provides data about storage settings.", "====> * pam_modules_scanner", " Scan the pam directory for services and modules used in them", "====> * transaction_workarounds", " Provides additional RPM transaction tasks based on bundled RPM packages.", "====> * scan_pkg_manager", " Provides data about package manager (yum/dnf)", "====> * firewalld_facts_actor", " Provide data about firewalld", "====> * checkrhui", " Check if system is using RHUI infrastructure (on public cloud) and send messages to", "====> * scan_sap_hana", " Gathers information related to SAP HANA instances on the system.", "====> * check_grub_legacy", " Check whether GRUB Legacy is installed in the MBR.", "====> * scandasd", " In case of s390x architecture, check whether DASD is used.", "====> * scan_source_kernel", " Scan the source system kernel.", "====> * scan_target_os_image", " Scans the provided target OS ISO image to use as a content source for the IPU, if any.", "====> * satellite_upgrade_facts", " Report which Satellite packages require updates and how to handle PostgreSQL data", "====> * network_manager_read_config", " Provides data about NetworkManager configuration.", "====> * remove_obsolete_gpg_keys", " Remove obsoleted RPM GPG keys.", "====> * persistentnetnames", " Get network interface information for physical ethernet interfaces of the original system.", "====> * get_installed_desktops", " Actor checks if kde or gnome desktop environments", "====> * scancpu", " Scan CPUs of the machine.", "====> * trusted_gpg_keys_scanner", " Scan for trusted GPG keys.", "====> * repositories_blacklist", " Exclude target repositories provided by Red Hat without support.", "====> * biosdevname", " Enable biosdevname on the target RHEL system if all interfaces on the source RHEL", "====> * check_kde_apps", " Actor checks which KDE apps are installed.", "====> * rpm_transaction_config_tasks_collector", " Provides additional RPM transaction tasks from /etc/leapp/transaction.", "====> * ipa_scanner", " Scan system for ipa-client and ipa-server status", "====> * scan_grub_device_partition_layout", " Scan all identified GRUB devices for their partition layout.", "====> * quagga_daemons", " Active quagga daemons check.", "====> * multipath_conf_read", " Read multipath configuration files and extract the necessary information", "====> * scan_dynamic_linker_configuration", " Scan the dynamic linker configuration and find modifications.", "====> * cups_scanner", " Gather facts about CUPS features which needs to be migrated", "====> * spamassassin_config_read", " Reads spamc configuration (/etc/mail/spamassassin/spamc.conf), the", "====> * xfs_info_scanner", " This actor scans all mounted mountpoints for XFS information", "====> * persistentnetnamesdisable", " Disable systemd-udevd persistent network naming on machine with single eth0 NIC", "====> * pes_events_scanner", " Provides data about package events from Package Evolution Service.", "====> * setuptargetrepos", " Produces list of repositories that should be available to be used by Upgrade process.", "==> Processing phase `Checks`", "====> * open_ssh_algorithms", " OpenSSH configuration does not contain any unsupported cryptographic algorithms.", "====> * checkgrep", " Check if Grep is installed. If yes, write information about non-compatible changes.", "====> * python_inform_user", " This actor informs the user of differences in Python version and support in RHEL 8.", "====> * check_os_release", " Check if the current RHEL minor version is supported. If not, inhibit the upgrade process.", "====> * zipl_check_boot_entries", " Inhibits the upgrade if a problematic Zipl configuration is detected on the system.", "====> * check_btrfs", " Check if Btrfs filesystem is in use. If yes, inhibit the upgrade process.", "====> * open_ssh_use_privilege_separation", " UsePrivilegeSeparation configuration option was removed.", "====> * check_rhsmsku", " Ensure the system is subscribed to the subscription manager", "====> * postgresql_check", " Actor checking for presence of PostgreSQL installation.", "====> * check_kde_gnome", " Checks whether KDE is installed", "====> * checkmemory", " The actor check the size of RAM against RHEL8 minimal hardware requirements", "====> * check_detected_devices_and_drivers", " Checks whether or not detected devices and drivers are usable on the target system.", "====> * check_root_symlinks", " Check if the symlinks /bin and /lib are relative, not absolute.", "====> * openssh_permit_root_login", " OpenSSH no longer allows root logins with password.", "====> * check_firewalld", " Check for certain firewalld configuration that may prevent an upgrade.", "====> * check_ipa_server", " Check for ipa-server and inhibit upgrade", "====> * detect_grub_config_error", " Check grub configuration for various errors.", "====> * check_systemd_broken_symlinks", " Check whether some systemd symlinks are broken", "====> * check_system_arch", " Check if system is running at a supported architecture. If no, inhibit the upgrade process.", "====> * checkirssi", " Check if irssi is installed. If yes, write information about non-compatible changes.", "====> * cups_check", " Reports changes in configuration between CUPS 1.6.3 and 2.2.6", "====> * cephvolumescan", " Retrieves the list of encrypted Ceph OSD", "====> * check_skipped_repositories", " Produces a report if any repositories enabled on the system are going to be skipped.", "====> * multiple_package_versions", " Check for problematic 32bit packages installed together with 64bit ones.", "====> * sssd_check", " Check SSSD configuration for changes in RHEL8 and report them.", "====> * check_grub_core", " Check whether we are on legacy (BIOS) system and instruct Leapp to upgrade GRUB core", "====> * check_consumed_assets", " Check whether Leapp is using correct data assets.", "====> * quagga_report", " Checking for babeld on RHEL-7.", "====> * check_yum_plugins_enabled", " Checks that the required yum plugins are enabled.", "====> * check_boot_avail_space", " Check if at least 100Mib of available space on /boot. If not, inhibit the upgrade process.", "====> * bacula_check", " Actor checking for presence of Bacula installation.", "====> * check_nfs", " Check if NFS filesystem is in use. If yes, inhibit the upgrade process.", "====> * spamassassin_config_check", " Reports changes in spamassassin between RHEL-7 and RHEL-8", "====> * check_wireshark", " Report a couple of changes in tshark usage", "====> * removed_pam_modules", " Check for modules that are not available in RHEL 8 anymore", "====> * check_mount_options", " Check for mount options preventing the upgrade.", "====> * check_insights_auto_register", " Checks if system can be automatically registered into Red Hat Insights", "====> * vsftpd_config_check", " Checks whether the vsftpd configuration is supported in RHEL-8. Namely checks that", "====> * check_etc_releasever", " Check releasever info and provide a guidance based on the facts", "====> * removed_pam_modules_check", " Check if it is all right to disable PAM modules that are not in RHEL-8.", "====> * check_openssl_conf", " Check whether the openssl configuration and openssl-IBMCA.", "====> * sctp_checks", " Parses collected SCTP information and take necessary actions.", "====> * check_fips", " Inhibit upgrade if FIPS is detected as enabled.", "====> * checktargetrepos", " Check whether target yum repositories are specified.", "====> * check_docker", " Checks if Docker is installed and warns about its deprecation in RHEL8.", "====> * check_custom_modifications_actor", " Checks CustomModifications messages and produces a report about files in leapp directories that have been", "====> * check_brltty", " Check if brltty is installed, check whether configuration update is needed.", "====> * check_ntp", " Check if ntp and/or ntpdate configuration needs to be migrated.", "====> * check_target_iso", " Check that the provided target ISO is a valid ISO image and is located on a persistent partition.", "====> * check_sap_hana", " If SAP HANA has been detected, several checks are performed to ensure a successful upgrade.", "====> * enable_device_cio_free_service", " Enables device_cio_free.service systemd service on s390x", "====> * powertop", " Check if PowerTOP is installed. If yes, write information about non-compatible changes.", "====> * check_fstab_mount_order", " Checks order of entries in /etc/fstab based on their mount point and inhibits upgrade if overshadowing is detected.", "====> * checkhybridimage", " Check if the system is using Azure hybrid image.", "====> * open_ssh_deprecated_directives_check", " Check for any deprecated directives in the OpenSSH configuration.", "====> * checkfstabxfsoptions", " Check the FSTAB file for the deprecated / removed XFS mount options.", "====> * tcp_wrappers_check", " Check the list of packages previously compiled with TCP wrappers support", "====> * check_memcached", " Check for incompatible changes in memcached configuration.", "====> * check_chrony", " Check for incompatible changes in chrony configuration.", "====> * check_installed_debug_kernels", " Inhibit IPU (in-place upgrade) when multiple debug kernels are installed.", "====> * checkdosfstools", " Check if dosfstools is installed. If yes, write information about non-compatible changes.", "====> * checkacpid", " Check if acpid is installed. If yes, write information about non-compatible changes.", "====> * check_installed_devel_kernels", " Inhibit IPU (in-place upgrade) when multiple devel kernels are installed.", "====> * unsupported_upgrade_check", " Checks environment variables and produces a warning report if the upgrade is unsupported.", "====> * check_cifs", " Check if CIFS filesystem is in use. If yes, inhibit the upgrade process.", "====> * multipath_conf_check", " Checks whether the multipath configuration can be updated to RHEL-8 and", "====> * authselect_check", " Confirm suggested authselect call from AuthselectScanner.", "====> * check_bind", " Actor parsing BIND configuration and checking for known issues in it.", "====> * check_sendmail", " Check if sendmail is installed, check whether configuration update is needed, inhibit upgrade if TCP wrappers", "====> * check_postfix", " Check if postfix is installed, check whether configuration update is needed.", "====> * check_dynamic_linker_configuration", " Check for customization of dynamic linker configuration.", "====> * check_rpm_transaction_events", " Filter RPM transaction events based on installed RPM packages", "====> * check_installed_kernels", " Inhibit IPU (in-place upgrade) when installed kernels conflict with a safe upgrade.", "====> * efi_check_boot", " Adjust EFI boot entry for first reboot", "====> * satellite_upgrade_check", " Check state of Satellite system before upgrade", "====> * check_first_partition_offset", " Check whether the first partition starts at the offset >=1MiB.", "====> * check_removed_envvars", " Check for usage of removed environment variables and inhibit the upgrade", "====> * open_ssh_protocol", " Protocol configuration option was removed.", "====> * red_hat_signed_rpm_check", " Check if there are packages not signed by Red Hat in use. If yes, warn user about it.", "====> * check_ha_cluster", " Check if HA Cluster is in use. If yes, inhibit the upgrade process.", "====> * check_persistent_mounts", " Check if mounts required to be persistent are mounted in persistent fashion.", "====> * check_se_linux", " Check SELinux status and produce decision messages for further action.", "====> * check_luks_and_inhibit", " Check if any encrypted partitions is in use. If yes, inhibit the upgrade process.", "====> * check_skip_phase", " Skip all the subsequent phases until the report phase.", "==> Processing phase `Reports`", "====> * verify_check_results", " Check all dialogs and notify that user needs to make some choices.", "====> * verify_check_results", " Check all generated results messages and notify user about them.", "", "Debug output written to /var/log/leapp/leapp-preupgrade.log", "", "============================================================", " REPORT OVERVIEW ", "============================================================", "", "Upgrade has been inhibited due to the following problems:", " 1. Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", " 2. Use of NFS detected. Upgrade can't proceed", " 3. Use of CIFS detected. Upgrade can't proceed", "", "HIGH and MEDIUM severity reports:", " 1. Packages available in excluded repositories will not be installed", " 2. Difference in Python versions and support in RHEL 8", " 3. GRUB2 core will be automatically updated during the upgrade", " 4. Upgrade is unsupported", " 5. Module pam_pkcs11 will be removed from PAM configuration", " 6. chrony using default configuration", "", "Reports summary:", " Errors: 0", " Inhibitors: 3", " HIGH severity reports: 4", " MEDIUM severity reports: 2", " LOW severity reports: 5", " INFO severity reports: 3", "", "Before continuing, review the full report below for details about discovered problems and possible remediation instructions:", " A report has been generated at /var/log/leapp/leapp-report.txt", " A report has been generated at /var/log/leapp/leapp-report.json", "", "============================================================", " END OF REPORT OVERVIEW ", "============================================================", "", "Answerfile has been generated at /var/log/leapp/answerfile"]} TASK [analysis-leapp | Include custom_local_repos for local_repos_post_analysis] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:89 TASK [infra.leapp.common : custom_local_repos | Remove old /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:2 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : custom_local_repos | Enable custom upgrade yum repositories] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:9 skipping: [managed-node01] => {"changed": false, "skipped_reason": "No items in the list"} TASK [infra.leapp.analysis : analysis-leapp | Include check-results-file.yml] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:97 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/check-results-file.yml for managed-node01 TASK [infra.leapp.analysis : check-results-file | Result file status] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/check-results-file.yml:2 ok: [managed-node01] => {"changed": false, "stat": {"atime": 1766074104.9588072, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 32, "charset": "us-ascii", "checksum": "db0e5377e6e153b4e99e5e5efaa9f392a152e07e", "ctime": 1766074104.9598072, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 46137425, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1766074104.9598072, "nlink": 1, "path": "/var/log/leapp/leapp-report.txt", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 12814, "uid": 0, "version": "18446744072067886097", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} TASK [infra.leapp.analysis : check-results-file | Check that result file exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/check-results-file.yml:7 ok: [managed-node01] => { "changed": false, "msg": "All assertions passed" } TASK [analysis-leapp | Run parse_leapp_report to check for inhibitors] ********* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:100 TASK [infra.leapp.common : parse_leapp_report | Default upgrade_inhibited to false] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:12 ok: [managed-node01] => {"ansible_facts": {"upgrade_inhibited": false}, "changed": false} TASK [infra.leapp.common : parse_leapp_report | Collect human readable report results] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:16 ok: [managed-node01] => {"changed": false, "content": "Risk Factor: high (inhibitor)
Title: Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.
Summary: Support for the following RHEL 7 device drivers has been removed in RHEL 8:
     - pata_acpi

Related links:
    - Leapp preupgrade getting "Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed." : https://access.redhat.com/solutions/6971716
    - Leapp upgrade fail with error "Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.": https://access.redhat.com/solutions/5436131
Key: f08a07da902958defa4f5c2699fae9ec2eb67c5b
----------------------------------------
Risk Factor: high (inhibitor)
Title: Use of NFS detected. Upgrade can't proceed
Summary: NFS is currently not supported by the inplace upgrade.
We have found NFS usage at the following locations:
- NFS shares found in /etc/fstab:
 - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat
 - nest.test.redhat.com:/mnt/qa /mnt/qa
 - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive
 - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist
 - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew
 - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch

Related links:
    - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006
Remediation: [hint] Disable NFS temporarily for the upgrade if possible.
Key: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed
----------------------------------------
Risk Factor: high (inhibitor)
Title: Use of CIFS detected. Upgrade can't proceed
Summary: CIFS is currently not supported by the inplace upgrade.
Related links:
    - Leapp upgrade failed with error "Inhibitor: Use of CIFS detected. Upgrade cannot proceed": https://access.redhat.com/solutions/6964304
Remediation: [hint] Comment out CIFS entries to proceed with the upgrade.
Key: d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a
----------------------------------------
Risk Factor: high 
Title: Packages available in excluded repositories will not be installed
Summary: 2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled "Excluded target system repositories" for details.
The list of these packages:
- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)
- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)
Key: 2437e204808f987477c0e9be8e4c95b3a87a9f3e
----------------------------------------
Risk Factor: high 
Title: Difference in Python versions and support in RHEL 8
Summary: In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python
Related links:
    - Difference in Python versions and support in RHEL 8: https://red.ht/rhel-8-python
Remediation: [hint] Please run "alternatives --set python /usr/bin/python3" after upgrade
Key: 0c98585b1d8d252eb540bf61560094f3495351f5
----------------------------------------
Risk Factor: high 
Title: GRUB2 core will be automatically updated during the upgrade
Summary: On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running "grub2-install" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.
Key: ac7030e05d2ee248d34f08a9fa040b352bc410a3
----------------------------------------
Risk Factor: high 
Title: Upgrade is unsupported
Summary: Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.

Key: 9e5088e3c1f371e020ec777c3d86578f4be143cf
----------------------------------------
Risk Factor: medium 
Title: Module pam_pkcs11 will be removed from PAM configuration
Summary: Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.
Remediation: [hint] Configure SSSD to replace pam_pkcs11
Key: bf47e7305d6805e8bbeaa7593cf01e38030c23f3
----------------------------------------
Risk Factor: medium 
Title: chrony using default configuration
Summary: default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives
Key: c4222ebd18730a76f6bc7b3b66df898b106e6554
----------------------------------------
Risk Factor: low 
Title: Grep has incompatible changes in the next major version
Summary: If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.
The 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.
In locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.
When searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.
The 'grep -z' no longer automatically treats the byte '\200' as binary data.
Context no longer excludes selected lines omitted because of -m. For example, 'grep "^" -m1 -A1' now outputs the first two input lines, not just the first line.

Remediation: [hint] Please update your scripts to be compatible with the changes.
Key: 94665a499e2eeee35eca3e7093a7abe183384b16
----------------------------------------
Risk Factor: low 
Title: Detected broken systemd symlinks for non-existing services
Summary: Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:
    - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service
Remediation: [hint] Remove the invalid symlinks before the upgrade.
[command] /usr/bin/rm /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service
Key: be2083fee03f5f0a708fd193d82d2fe20aee7217
----------------------------------------
Risk Factor: low 
Title: Some enabled RPM repositories are unknown to Leapp
Summary: The following repositories with Red Hat-signed packages are unknown to Leapp:
- rhel
And the following packages installed from those repositories may not be upgraded:
- libsolv
- python-perf
- kernel-tools-libs
- libreport-filesystem
- json-glib
- librepo
- kernel-tools
Remediation: [hint] You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket
Key: 8e89e20c645cea600b240156071d81c64daab7ad
----------------------------------------
Risk Factor: low 
Title: Postfix has incompatible changes in the next major version
Summary: Postfix 3.x has so called "compatibility safety net" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.
The backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.
It can be turned on by running:  "postconf -e compatibility_level=0
It can be turned off by running: "postconf -e compatibility_level=2

In the Postfix MySQL database client, the default "option_group" value has changed to "client", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set "option_group" to the empty string.

The postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.

Postfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to "auto", and introduces a new parameter "tls_eecdh_auto_curves" with the names of curves that may be negotiated.

The "master.cf" chroot default value has changed from "y" (yes) to "n" (no). This applies to master.cf services where chroot field is not explicitly specified.

The "append_dot_mydomain" default value has changed from "yes" to "no". You may need changing it to "yes" if senders cannot use complete domain names in e-mail addresses.

The "relay_domains" default value has changed from "$mydestination" to the empty value. This could result in unexpected "Relay access denied" errors or ETRN errors, because now will postfix by default relay only for the localhost.

The "mynetworks_style" default value has changed from "subnet" to "host". This parameter is used to implement the "permit_mynetworks" feature. The change could result in unexpected "access denied" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.

Postfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.

Key: 5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33
----------------------------------------
Risk Factor: low 
Title: SElinux will be set to permissive mode
Summary: SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.
Remediation: [hint] Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the "/root/tmp_leapp_py3" SElinux warnings.
Key: 39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f
----------------------------------------
Risk Factor: info 
Title: Excluded target system repositories
Summary: The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.
- codeready-builder-beta-for-rhel-8-s390x-rpms
- codeready-builder-beta-for-rhel-8-ppc64le-rpms
- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms
- codeready-builder-for-rhel-8-aarch64-eus-rpms
- codeready-builder-for-rhel-8-ppc64le-eus-rpms
- codeready-builder-beta-for-rhel-8-x86_64-rpms
- codeready-builder-for-rhel-8-aarch64-rpms
- codeready-builder-for-rhel-8-s390x-rpms
- codeready-builder-for-rhel-8-s390x-eus-rpms
- codeready-builder-for-rhel-8-x86_64-eus-rpms
- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms
- codeready-builder-beta-for-rhel-8-aarch64-rpms
- codeready-builder-for-rhel-8-rhui-rpms
- codeready-builder-for-rhel-8-x86_64-rhui-rpms
- codeready-builder-for-rhel-8-x86_64-rpms
- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms
- codeready-builder-for-rhel-8-ppc64le-rpms
Remediation: [hint] If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).
Key: 1b9132cb2362ae7830e48eee7811be9527747de8
----------------------------------------
Risk Factor: info 
Title: Current PAM and nsswitch.conf configuration will be kept.
Summary: There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.
Key: 40c4ab1da4a30dc1ca40e543f6385e1336d8810c
----------------------------------------
Risk Factor: info 
Title: SElinux relabeling will be scheduled
Summary: SElinux relabeling will be scheduled as the status is permissive/enforcing.
Key: 8fb81863f8413bd617c2a55b69b8e10ff03d7c72
----------------------------------------
", "encoding": "base64", "source": "/var/log/leapp/leapp-report.txt"} TASK [infra.leapp.common : parse_leapp_report | Collect JSON report results] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:21 ok: [managed-node01] => {"changed": false, "content": "{
  "leapp_run_id": "ed44ff34-02f9-42be-a31a-d4bb7458cd15", 
  "entries": [
    {
      "groups": [
        "repository", 
        "failure"
      ], 
      "title": "Excluded target system repositories", 
      "timeStamp": "2025-12-18T16:08:17.398541Z", 
      "hostname": "managed-node01", 
      "detail": {
        "remediations": [
          {
            "type": "hint", 
            "context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times)."
          }
        ]
      }, 
      "actor": "repositories_blacklist", 
      "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms", 
      "audience": "sysadmin", 
      "key": "1b9132cb2362ae7830e48eee7811be9527747de8", 
      "id": "eb00dfd4b19561998061dd8d4554f258d0a68aa79e3e950614bf450671747149", 
      "severity": "info"
    }, 
    {
      "groups": [
        "repository"
      ], 
      "title": "Packages available in excluded repositories will not be installed", 
      "timeStamp": "2025-12-18T16:08:19.997376Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "python3-pyxattr"
          }, 
          {
            "scheme": "package", 
            "title": "rpcgen"
          }
        ]
      }, 
      "actor": "pes_events_scanner", 
      "summary": "2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", 
      "audience": "sysadmin", 
      "key": "2437e204808f987477c0e9be8e4c95b3a87a9f3e", 
      "id": "fb5b080da49e736824977b0ffdc835d6af685ac8d0afd5a16c9335d934af387f", 
      "severity": "high"
    }, 
    {
      "groups": [
        "tools"
      ], 
      "title": "Grep has incompatible changes in the next major version", 
      "timeStamp": "2025-12-18T16:08:20.252640Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "grep"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Please update your scripts to be compatible with the changes."
          }
        ]
      }, 
      "actor": "checkgrep", 
      "summary": "If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.\nThe 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.\nIn locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.\nWhen searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.\nThe 'grep -z' no longer automatically treats the byte '\\200' as binary data.\nContext no longer excludes selected lines omitted because of -m. For example, 'grep \"^\" -m1 -A1' now outputs the first two input lines, not just the first line.\n", 
      "audience": "sysadmin", 
      "key": "94665a499e2eeee35eca3e7093a7abe183384b16", 
      "id": "de7b5e22f23344bc4d72b9b0caac92cda15a094c68952b1ee3d75c4d4ade0dfe", 
      "severity": "low"
    }, 
    {
      "groups": [
        "python"
      ], 
      "title": "Difference in Python versions and support in RHEL 8", 
      "timeStamp": "2025-12-18T16:08:20.292089Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "python"
          }, 
          {
            "scheme": "package", 
            "title": "python2"
          }, 
          {
            "scheme": "package", 
            "title": "python3"
          }
        ], 
        "external": [
          {
            "url": "https://red.ht/rhel-8-python", 
            "title": "Difference in Python versions and support in RHEL 8"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Please run \"alternatives --set python /usr/bin/python3\" after upgrade"
          }
        ]
      }, 
      "actor": "python_inform_user", 
      "summary": "In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", 
      "audience": "developer", 
      "key": "0c98585b1d8d252eb540bf61560094f3495351f5", 
      "id": "bcf11fdb264a0688181b1aa36c1f3d11c06021a6ef0a3e2a5c824722650840f6", 
      "severity": "high"
    }, 
    {
      "groups": [
        "kernel", 
        "drivers", 
        "inhibitor"
      ], 
      "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", 
      "timeStamp": "2025-12-18T16:08:20.802663Z", 
      "hostname": "managed-node01", 
      "detail": {
        "external": [
          {
            "url": "https://access.redhat.com/solutions/6971716", 
            "title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" "
          }, 
          {
            "url": "https://access.redhat.com/solutions/5436131", 
            "title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\""
          }
        ]
      }, 
      "actor": "check_detected_devices_and_drivers", 
      "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n     - pata_acpi\n", 
      "audience": "sysadmin", 
      "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", 
      "id": "e3f427823b8355567496978da8f6ad5846cb29138edef4920e193c0f3ae92a64", 
      "severity": "high"
    }, 
    {
      "groups": [
        "filesystem"
      ], 
      "title": "Detected broken systemd symlinks for non-existing services", 
      "timeStamp": "2025-12-18T16:08:21.029599Z", 
      "hostname": "managed-node01", 
      "detail": {
        "remediations": [
          {
            "type": "hint", 
            "context": "Remove the invalid symlinks before the upgrade."
          }, 
          {
            "type": "command", 
            "context": [
              "/usr/bin/rm", 
              "/etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service"
            ]
          }
        ]
      }, 
      "actor": "check_systemd_broken_symlinks", 
      "summary": "Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:\n    - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", 
      "audience": "sysadmin", 
      "key": "be2083fee03f5f0a708fd193d82d2fe20aee7217", 
      "id": "dd082b42d5de8e94951d316696bc75fbd6093982ee2d8935d940146bb286560a", 
      "severity": "low"
    }, 
    {
      "groups": [
        "repository"
      ], 
      "title": "Some enabled RPM repositories are unknown to Leapp", 
      "timeStamp": "2025-12-18T16:08:21.264596Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "libsolv"
          }, 
          {
            "scheme": "package", 
            "title": "python-perf"
          }, 
          {
            "scheme": "package", 
            "title": "kernel-tools-libs"
          }, 
          {
            "scheme": "package", 
            "title": "libreport-filesystem"
          }, 
          {
            "scheme": "package", 
            "title": "json-glib"
          }, 
          {
            "scheme": "package", 
            "title": "librepo"
          }, 
          {
            "scheme": "package", 
            "title": "kernel-tools"
          }, 
          {
            "scheme": "repository", 
            "title": "rhel"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket"
          }
        ]
      }, 
      "actor": "check_skipped_repositories", 
      "summary": "The following repositories with Red Hat-signed packages are unknown to Leapp:\n- rhel\nAnd the following packages installed from those repositories may not be upgraded:\n- libsolv\n- python-perf\n- kernel-tools-libs\n- libreport-filesystem\n- json-glib\n- librepo\n- kernel-tools", 
      "audience": "sysadmin", 
      "key": "8e89e20c645cea600b240156071d81c64daab7ad", 
      "id": "9e123c8d868e5d97f94972017035575313929da5b2d0b2619b5ccc5c1eedc63a", 
      "severity": "low"
    }, 
    {
      "groups": [
        "boot"
      ], 
      "title": "GRUB2 core will be automatically updated during the upgrade", 
      "timeStamp": "2025-12-18T16:08:21.477826Z", 
      "hostname": "managed-node01", 
      "actor": "check_grub_core", 
      "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", 
      "audience": "sysadmin", 
      "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", 
      "id": "085356ec0993c463eb136e1b9c1e791825b4c82656814cbf1cc04fc6354d7772", 
      "severity": "high"
    }, 
    {
      "groups": [
        "filesystem", 
        "network", 
        "inhibitor"
      ], 
      "title": "Use of NFS detected. Upgrade can't proceed", 
      "timeStamp": "2025-12-18T16:08:21.837113Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "file", 
            "title": "/etc/fstab"
          }
        ], 
        "external": [
          {
            "url": "https://access.redhat.com/solutions/6964006", 
            "title": "Why does leapp upgrade fail on detecting NFS during upgrade?"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Disable NFS temporarily for the upgrade if possible."
          }
        ]
      }, 
      "actor": "check_nfs", 
      "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", 
      "audience": "sysadmin", 
      "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", 
      "id": "9e3e3cf2d2be70f483b7f3a5f63cfab6d2001a75cd139741f8357a5f065cf2f2", 
      "severity": "high"
    }, 
    {
      "groups": [
        "authentication", 
        "security", 
        "tools"
      ], 
      "title": "Module pam_pkcs11 will be removed from PAM configuration", 
      "timeStamp": "2025-12-18T16:08:22.261862Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "sssd"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Configure SSSD to replace pam_pkcs11"
          }
        ]
      }, 
      "actor": "removed_pam_modules_check", 
      "summary": "Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.", 
      "audience": "sysadmin", 
      "key": "bf47e7305d6805e8bbeaa7593cf01e38030c23f3", 
      "id": "737879c8399731e7817d8733ddc81274f6bbfff74b172c0f4e3970a403586490", 
      "severity": "medium"
    }, 
    {
      "groups": [
        "services", 
        "time management"
      ], 
      "title": "chrony using default configuration", 
      "timeStamp": "2025-12-18T16:08:23.486703Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "ntpd"
          }, 
          {
            "scheme": "package", 
            "title": "chrony"
          }, 
          {
            "scheme": "file", 
            "title": "/etc/chrony.conf"
          }
        ]
      }, 
      "actor": "check_chrony", 
      "summary": "default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives", 
      "audience": "sysadmin", 
      "key": "c4222ebd18730a76f6bc7b3b66df898b106e6554", 
      "id": "946f87754df9dae8dfff2e91cd4b80dc01379843fbeb16a275400ad49d66feaa", 
      "severity": "medium"
    }, 
    {
      "groups": [
        "upgrade process", 
        "sanity"
      ], 
      "title": "Upgrade is unsupported", 
      "timeStamp": "2025-12-18T16:08:23.822646Z", 
      "hostname": "managed-node01", 
      "actor": "unsupported_upgrade_check", 
      "summary": "Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.\n", 
      "audience": "sysadmin", 
      "key": "9e5088e3c1f371e020ec777c3d86578f4be143cf", 
      "id": "b8bddc307355cc09c7386a52943527de8eb95ae904b3b116cfcbbc22ac2c6369", 
      "severity": "high"
    }, 
    {
      "groups": [
        "filesystem", 
        "network", 
        "inhibitor"
      ], 
      "title": "Use of CIFS detected. Upgrade can't proceed", 
      "timeStamp": "2025-12-18T16:08:23.865954Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "file", 
            "title": "/etc/fstab"
          }
        ], 
        "external": [
          {
            "url": "https://access.redhat.com/solutions/6964304", 
            "title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\""
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Comment out CIFS entries to proceed with the upgrade."
          }
        ]
      }, 
      "actor": "check_cifs", 
      "summary": "CIFS is currently not supported by the inplace upgrade.", 
      "audience": "sysadmin", 
      "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", 
      "id": "86bf2693d7906c2175b864de82e00a3383df112c7b72028999a9f8d631129b1b", 
      "severity": "high"
    }, 
    {
      "groups": [
        "authentication", 
        "security", 
        "tools"
      ], 
      "title": "Current PAM and nsswitch.conf configuration will be kept.", 
      "timeStamp": "2025-12-18T16:08:23.944032Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "authselect"
          }, 
          {
            "scheme": "package", 
            "title": "authconfig"
          }, 
          {
            "scheme": "file", 
            "title": "/etc/nsswitch.conf"
          }
        ]
      }, 
      "actor": "authselect_check", 
      "summary": "There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.", 
      "audience": "sysadmin", 
      "key": "40c4ab1da4a30dc1ca40e543f6385e1336d8810c", 
      "id": "81cca5a856b1c2cc54831e57d83d30a56336a28c3f3c752337d2b3e20135ad7a", 
      "severity": "info"
    }, 
    {
      "groups": [
        "services", 
        "email"
      ], 
      "title": "Postfix has incompatible changes in the next major version", 
      "timeStamp": "2025-12-18T16:08:24.175162Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "postfix"
          }
        ]
      }, 
      "actor": "check_postfix", 
      "summary": "Postfix 3.x has so called \"compatibility safety net\" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.\nThe backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.\nIt can be turned on by running:  \"postconf -e compatibility_level=0\nIt can be turned off by running: \"postconf -e compatibility_level=2\n\nIn the Postfix MySQL database client, the default \"option_group\" value has changed to \"client\", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set \"option_group\" to the empty string.\n\nThe postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.\n\nPostfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to \"auto\", and introduces a new parameter \"tls_eecdh_auto_curves\" with the names of curves that may be negotiated.\n\nThe \"master.cf\" chroot default value has changed from \"y\" (yes) to \"n\" (no). This applies to master.cf services where chroot field is not explicitly specified.\n\nThe \"append_dot_mydomain\" default value has changed from \"yes\" to \"no\". You may need changing it to \"yes\" if senders cannot use complete domain names in e-mail addresses.\n\nThe \"relay_domains\" default value has changed from \"$mydestination\" to the empty value. This could result in unexpected \"Relay access denied\" errors or ETRN errors, because now will postfix by default relay only for the localhost.\n\nThe \"mynetworks_style\" default value has changed from \"subnet\" to \"host\". This parameter is used to implement the \"permit_mynetworks\" feature. The change could result in unexpected \"access denied\" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.\n\nPostfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.\n", 
      "audience": "sysadmin", 
      "key": "5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33", 
      "id": "56740ca449faa524697fda034bd04291fc2ece4ad98718f8b11cdd41ba13587a", 
      "severity": "low"
    }, 
    {
      "groups": [
        "selinux", 
        "security"
      ], 
      "title": "SElinux relabeling will be scheduled", 
      "timeStamp": "2025-12-18T16:08:24.752879Z", 
      "hostname": "managed-node01", 
      "actor": "check_se_linux", 
      "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", 
      "audience": "sysadmin", 
      "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", 
      "id": "884fb6f6fa9617d1f65b5d6a06557163ae3f8bc93bdb9f69e989e6619f08c08d", 
      "severity": "info"
    }, 
    {
      "groups": [
        "selinux", 
        "security"
      ], 
      "title": "SElinux will be set to permissive mode", 
      "timeStamp": "2025-12-18T16:08:24.756673Z", 
      "hostname": "managed-node01", 
      "detail": {
        "remediations": [
          {
            "type": "hint", 
            "context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings."
          }
        ]
      }, 
      "actor": "check_se_linux", 
      "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", 
      "audience": "sysadmin", 
      "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", 
      "id": "b9f5aa541073971ca2bf084cbd44886ce9f0a9615d159296036541aba83deffb", 
      "severity": "low"
    }
  ]
}
", "encoding": "base64", "source": "/var/log/leapp/leapp-report.json"} TASK [infra.leapp.common : parse_leapp_report | Parse report results] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:26 ok: [managed-node01] => {"ansible_facts": {"leapp_report_json": {"entries": [{"actor": "repositories_blacklist", "audience": "sysadmin", "detail": {"remediations": [{"context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "type": "hint"}]}, "groups": ["repository", "failure"], "hostname": "managed-node01", "id": "eb00dfd4b19561998061dd8d4554f258d0a68aa79e3e950614bf450671747149", "key": "1b9132cb2362ae7830e48eee7811be9527747de8", "severity": "info", "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms", "timeStamp": "2025-12-18T16:08:17.398541Z", "title": "Excluded target system repositories"}, {"actor": "pes_events_scanner", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "python3-pyxattr"}, {"scheme": "package", "title": "rpcgen"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "fb5b080da49e736824977b0ffdc835d6af685ac8d0afd5a16c9335d934af387f", "key": "2437e204808f987477c0e9be8e4c95b3a87a9f3e", "severity": "high", "summary": "2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", "timeStamp": "2025-12-18T16:08:19.997376Z", "title": "Packages available in excluded repositories will not be installed"}, {"actor": "checkgrep", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "grep"}], "remediations": [{"context": "Please update your scripts to be compatible with the changes.", "type": "hint"}]}, "groups": ["tools"], "hostname": "managed-node01", "id": "de7b5e22f23344bc4d72b9b0caac92cda15a094c68952b1ee3d75c4d4ade0dfe", "key": "94665a499e2eeee35eca3e7093a7abe183384b16", "severity": "low", "summary": "If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.\nThe 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.\nIn locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.\nWhen searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.\nThe 'grep -z' no longer automatically treats the byte '\\200' as binary data.\nContext no longer excludes selected lines omitted because of -m. For example, 'grep \"^\" -m1 -A1' now outputs the first two input lines, not just the first line.\n", "timeStamp": "2025-12-18T16:08:20.252640Z", "title": "Grep has incompatible changes in the next major version"}, {"actor": "python_inform_user", "audience": "developer", "detail": {"external": [{"title": "Difference in Python versions and support in RHEL 8", "url": "https://red.ht/rhel-8-python"}], "related_resources": [{"scheme": "package", "title": "python"}, {"scheme": "package", "title": "python2"}, {"scheme": "package", "title": "python3"}], "remediations": [{"context": "Please run \"alternatives --set python /usr/bin/python3\" after upgrade", "type": "hint"}]}, "groups": ["python"], "hostname": "managed-node01", "id": "bcf11fdb264a0688181b1aa36c1f3d11c06021a6ef0a3e2a5c824722650840f6", "key": "0c98585b1d8d252eb540bf61560094f3495351f5", "severity": "high", "summary": "In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", "timeStamp": "2025-12-18T16:08:20.292089Z", "title": "Difference in Python versions and support in RHEL 8"}, {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "e3f427823b8355567496978da8f6ad5846cb29138edef4920e193c0f3ae92a64", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-12-18T16:08:20.802663Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}, {"actor": "check_systemd_broken_symlinks", "audience": "sysadmin", "detail": {"remediations": [{"context": "Remove the invalid symlinks before the upgrade.", "type": "hint"}, {"context": ["/usr/bin/rm", "/etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service"], "type": "command"}]}, "groups": ["filesystem"], "hostname": "managed-node01", "id": "dd082b42d5de8e94951d316696bc75fbd6093982ee2d8935d940146bb286560a", "key": "be2083fee03f5f0a708fd193d82d2fe20aee7217", "severity": "low", "summary": "Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:\n - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", "timeStamp": "2025-12-18T16:08:21.029599Z", "title": "Detected broken systemd symlinks for non-existing services"}, {"actor": "check_skipped_repositories", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "libsolv"}, {"scheme": "package", "title": "python-perf"}, {"scheme": "package", "title": "kernel-tools-libs"}, {"scheme": "package", "title": "libreport-filesystem"}, {"scheme": "package", "title": "json-glib"}, {"scheme": "package", "title": "librepo"}, {"scheme": "package", "title": "kernel-tools"}, {"scheme": "repository", "title": "rhel"}], "remediations": [{"context": "You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket", "type": "hint"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "9e123c8d868e5d97f94972017035575313929da5b2d0b2619b5ccc5c1eedc63a", "key": "8e89e20c645cea600b240156071d81c64daab7ad", "severity": "low", "summary": "The following repositories with Red Hat-signed packages are unknown to Leapp:\n- rhel\nAnd the following packages installed from those repositories may not be upgraded:\n- libsolv\n- python-perf\n- kernel-tools-libs\n- libreport-filesystem\n- json-glib\n- librepo\n- kernel-tools", "timeStamp": "2025-12-18T16:08:21.264596Z", "title": "Some enabled RPM repositories are unknown to Leapp"}, {"actor": "check_grub_core", "audience": "sysadmin", "groups": ["boot"], "hostname": "managed-node01", "id": "085356ec0993c463eb136e1b9c1e791825b4c82656814cbf1cc04fc6354d7772", "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", "severity": "high", "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", "timeStamp": "2025-12-18T16:08:21.477826Z", "title": "GRUB2 core will be automatically updated during the upgrade"}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "9e3e3cf2d2be70f483b7f3a5f63cfab6d2001a75cd139741f8357a5f065cf2f2", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2025-12-18T16:08:21.837113Z", "title": "Use of NFS detected. Upgrade can't proceed"}, {"actor": "removed_pam_modules_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "sssd"}], "remediations": [{"context": "Configure SSSD to replace pam_pkcs11", "type": "hint"}]}, "groups": ["authentication", "security", "tools"], "hostname": "managed-node01", "id": "737879c8399731e7817d8733ddc81274f6bbfff74b172c0f4e3970a403586490", "key": "bf47e7305d6805e8bbeaa7593cf01e38030c23f3", "severity": "medium", "summary": "Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.", "timeStamp": "2025-12-18T16:08:22.261862Z", "title": "Module pam_pkcs11 will be removed from PAM configuration"}, {"actor": "check_chrony", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "ntpd"}, {"scheme": "package", "title": "chrony"}, {"scheme": "file", "title": "/etc/chrony.conf"}]}, "groups": ["services", "time management"], "hostname": "managed-node01", "id": "946f87754df9dae8dfff2e91cd4b80dc01379843fbeb16a275400ad49d66feaa", "key": "c4222ebd18730a76f6bc7b3b66df898b106e6554", "severity": "medium", "summary": "default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives", "timeStamp": "2025-12-18T16:08:23.486703Z", "title": "chrony using default configuration"}, {"actor": "unsupported_upgrade_check", "audience": "sysadmin", "groups": ["upgrade process", "sanity"], "hostname": "managed-node01", "id": "b8bddc307355cc09c7386a52943527de8eb95ae904b3b116cfcbbc22ac2c6369", "key": "9e5088e3c1f371e020ec777c3d86578f4be143cf", "severity": "high", "summary": "Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.\n", "timeStamp": "2025-12-18T16:08:23.822646Z", "title": "Upgrade is unsupported"}, {"actor": "check_cifs", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "86bf2693d7906c2175b864de82e00a3383df112c7b72028999a9f8d631129b1b", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2025-12-18T16:08:23.865954Z", "title": "Use of CIFS detected. Upgrade can't proceed"}, {"actor": "authselect_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "authselect"}, {"scheme": "package", "title": "authconfig"}, {"scheme": "file", "title": "/etc/nsswitch.conf"}]}, "groups": ["authentication", "security", "tools"], "hostname": "managed-node01", "id": "81cca5a856b1c2cc54831e57d83d30a56336a28c3f3c752337d2b3e20135ad7a", "key": "40c4ab1da4a30dc1ca40e543f6385e1336d8810c", "severity": "info", "summary": "There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.", "timeStamp": "2025-12-18T16:08:23.944032Z", "title": "Current PAM and nsswitch.conf configuration will be kept."}, {"actor": "check_postfix", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "postfix"}]}, "groups": ["services", "email"], "hostname": "managed-node01", "id": "56740ca449faa524697fda034bd04291fc2ece4ad98718f8b11cdd41ba13587a", "key": "5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33", "severity": "low", "summary": "Postfix 3.x has so called \"compatibility safety net\" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.\nThe backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.\nIt can be turned on by running: \"postconf -e compatibility_level=0\nIt can be turned off by running: \"postconf -e compatibility_level=2\n\nIn the Postfix MySQL database client, the default \"option_group\" value has changed to \"client\", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set \"option_group\" to the empty string.\n\nThe postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.\n\nPostfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to \"auto\", and introduces a new parameter \"tls_eecdh_auto_curves\" with the names of curves that may be negotiated.\n\nThe \"master.cf\" chroot default value has changed from \"y\" (yes) to \"n\" (no). This applies to master.cf services where chroot field is not explicitly specified.\n\nThe \"append_dot_mydomain\" default value has changed from \"yes\" to \"no\". You may need changing it to \"yes\" if senders cannot use complete domain names in e-mail addresses.\n\nThe \"relay_domains\" default value has changed from \"$mydestination\" to the empty value. This could result in unexpected \"Relay access denied\" errors or ETRN errors, because now will postfix by default relay only for the localhost.\n\nThe \"mynetworks_style\" default value has changed from \"subnet\" to \"host\". This parameter is used to implement the \"permit_mynetworks\" feature. The change could result in unexpected \"access denied\" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.\n\nPostfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.\n", "timeStamp": "2025-12-18T16:08:24.175162Z", "title": "Postfix has incompatible changes in the next major version"}, {"actor": "check_se_linux", "audience": "sysadmin", "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "884fb6f6fa9617d1f65b5d6a06557163ae3f8bc93bdb9f69e989e6619f08c08d", "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", "severity": "info", "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", "timeStamp": "2025-12-18T16:08:24.752879Z", "title": "SElinux relabeling will be scheduled"}, {"actor": "check_se_linux", "audience": "sysadmin", "detail": {"remediations": [{"context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.", "type": "hint"}]}, "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "b9f5aa541073971ca2bf084cbd44886ce9f0a9615d159296036541aba83deffb", "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", "severity": "low", "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", "timeStamp": "2025-12-18T16:08:24.756673Z", "title": "SElinux will be set to permissive mode"}], "leapp_run_id": "ed44ff34-02f9-42be-a31a-d4bb7458cd15"}, "leapp_report_txt": ["Risk Factor: high (inhibitor)", "Title: Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", "Summary: Support for the following RHEL 7 device drivers has been removed in RHEL 8:", " - pata_acpi", "", "Related links:", " - Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" : https://access.redhat.com/solutions/6971716", " - Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\": https://access.redhat.com/solutions/5436131", "Key: f08a07da902958defa4f5c2699fae9ec2eb67c5b", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Use of NFS detected. Upgrade can't proceed", "Summary: NFS is currently not supported by the inplace upgrade.", "We have found NFS usage at the following locations:", "- NFS shares found in /etc/fstab:", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat", " - nest.test.redhat.com:/mnt/qa /mnt/qa", " - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive", " - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch", "", "Related links:", " - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006", "Remediation: [hint] Disable NFS temporarily for the upgrade if possible.", "Key: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Use of CIFS detected. Upgrade can't proceed", "Summary: CIFS is currently not supported by the inplace upgrade.", "Related links:", " - Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\": https://access.redhat.com/solutions/6964304", "Remediation: [hint] Comment out CIFS entries to proceed with the upgrade.", "Key: d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "----------------------------------------", "Risk Factor: high ", "Title: Packages available in excluded repositories will not be installed", "Summary: 2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.", "The list of these packages:", "- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", "- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", "Key: 2437e204808f987477c0e9be8e4c95b3a87a9f3e", "----------------------------------------", "Risk Factor: high ", "Title: Difference in Python versions and support in RHEL 8", "Summary: In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", "Related links:", " - Difference in Python versions and support in RHEL 8: https://red.ht/rhel-8-python", "Remediation: [hint] Please run \"alternatives --set python /usr/bin/python3\" after upgrade", "Key: 0c98585b1d8d252eb540bf61560094f3495351f5", "----------------------------------------", "Risk Factor: high ", "Title: GRUB2 core will be automatically updated during the upgrade", "Summary: On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", "Key: ac7030e05d2ee248d34f08a9fa040b352bc410a3", "----------------------------------------", "Risk Factor: high ", "Title: Upgrade is unsupported", "Summary: Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.", "", "Key: 9e5088e3c1f371e020ec777c3d86578f4be143cf", "----------------------------------------", "Risk Factor: medium ", "Title: Module pam_pkcs11 will be removed from PAM configuration", "Summary: Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.", "Remediation: [hint] Configure SSSD to replace pam_pkcs11", "Key: bf47e7305d6805e8bbeaa7593cf01e38030c23f3", "----------------------------------------", "Risk Factor: medium ", "Title: chrony using default configuration", "Summary: default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives", "Key: c4222ebd18730a76f6bc7b3b66df898b106e6554", "----------------------------------------", "Risk Factor: low ", "Title: Grep has incompatible changes in the next major version", "Summary: If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.", "The 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.", "In locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.", "When searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.", "The 'grep -z' no longer automatically treats the byte '\\200' as binary data.", "Context no longer excludes selected lines omitted because of -m. For example, 'grep \"^\" -m1 -A1' now outputs the first two input lines, not just the first line.", "", "Remediation: [hint] Please update your scripts to be compatible with the changes.", "Key: 94665a499e2eeee35eca3e7093a7abe183384b16", "----------------------------------------", "Risk Factor: low ", "Title: Detected broken systemd symlinks for non-existing services", "Summary: Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:", " - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", "Remediation: [hint] Remove the invalid symlinks before the upgrade.", "[command] /usr/bin/rm /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", "Key: be2083fee03f5f0a708fd193d82d2fe20aee7217", "----------------------------------------", "Risk Factor: low ", "Title: Some enabled RPM repositories are unknown to Leapp", "Summary: The following repositories with Red Hat-signed packages are unknown to Leapp:", "- rhel", "And the following packages installed from those repositories may not be upgraded:", "- libsolv", "- python-perf", "- kernel-tools-libs", "- libreport-filesystem", "- json-glib", "- librepo", "- kernel-tools", "Remediation: [hint] You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket", "Key: 8e89e20c645cea600b240156071d81c64daab7ad", "----------------------------------------", "Risk Factor: low ", "Title: Postfix has incompatible changes in the next major version", "Summary: Postfix 3.x has so called \"compatibility safety net\" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.", "The backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.", "It can be turned on by running: \"postconf -e compatibility_level=0", "It can be turned off by running: \"postconf -e compatibility_level=2", "", "In the Postfix MySQL database client, the default \"option_group\" value has changed to \"client\", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set \"option_group\" to the empty string.", "", "The postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.", "", "Postfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to \"auto\", and introduces a new parameter \"tls_eecdh_auto_curves\" with the names of curves that may be negotiated.", "", "The \"master.cf\" chroot default value has changed from \"y\" (yes) to \"n\" (no). This applies to master.cf services where chroot field is not explicitly specified.", "", "The \"append_dot_mydomain\" default value has changed from \"yes\" to \"no\". You may need changing it to \"yes\" if senders cannot use complete domain names in e-mail addresses.", "", "The \"relay_domains\" default value has changed from \"$mydestination\" to the empty value. This could result in unexpected \"Relay access denied\" errors or ETRN errors, because now will postfix by default relay only for the localhost.", "", "The \"mynetworks_style\" default value has changed from \"subnet\" to \"host\". This parameter is used to implement the \"permit_mynetworks\" feature. The change could result in unexpected \"access denied\" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.", "", "Postfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.", "", "Key: 5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33", "----------------------------------------", "Risk Factor: low ", "Title: SElinux will be set to permissive mode", "Summary: SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", "Remediation: [hint] Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.", "Key: 39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", "----------------------------------------", "Risk Factor: info ", "Title: Excluded target system repositories", "Summary: The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.", "- codeready-builder-beta-for-rhel-8-s390x-rpms", "- codeready-builder-beta-for-rhel-8-ppc64le-rpms", "- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms", "- codeready-builder-for-rhel-8-aarch64-eus-rpms", "- codeready-builder-for-rhel-8-ppc64le-eus-rpms", "- codeready-builder-beta-for-rhel-8-x86_64-rpms", "- codeready-builder-for-rhel-8-aarch64-rpms", "- codeready-builder-for-rhel-8-s390x-rpms", "- codeready-builder-for-rhel-8-s390x-eus-rpms", "- codeready-builder-for-rhel-8-x86_64-eus-rpms", "- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms", "- codeready-builder-beta-for-rhel-8-aarch64-rpms", "- codeready-builder-for-rhel-8-rhui-rpms", "- codeready-builder-for-rhel-8-x86_64-rhui-rpms", "- codeready-builder-for-rhel-8-x86_64-rpms", "- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms", "- codeready-builder-for-rhel-8-ppc64le-rpms", "Remediation: [hint] If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "Key: 1b9132cb2362ae7830e48eee7811be9527747de8", "----------------------------------------", "Risk Factor: info ", "Title: Current PAM and nsswitch.conf configuration will be kept.", "Summary: There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.", "Key: 40c4ab1da4a30dc1ca40e543f6385e1336d8810c", "----------------------------------------", "Risk Factor: info ", "Title: SElinux relabeling will be scheduled", "Summary: SElinux relabeling will be scheduled as the status is permissive/enforcing.", "Key: 8fb81863f8413bd617c2a55b69b8e10ff03d7c72", "----------------------------------------", ""]}, "changed": false} TASK [infra.leapp.common : parse_leapp_report | Check for inhibitors] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:32 skipping: [managed-node01] => (item={'groups': ['repository', 'failure'], 'title': 'Excluded target system repositories', 'timeStamp': '2025-12-18T16:08:17.398541Z', 'hostname': 'managed-node01', 'detail': {'remediations': [{'type': 'hint', 'context': 'If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).'}]}, 'actor': 'repositories_blacklist', 'summary': 'The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms', 'audience': 'sysadmin', 'key': '1b9132cb2362ae7830e48eee7811be9527747de8', 'id': 'eb00dfd4b19561998061dd8d4554f258d0a68aa79e3e950614bf450671747149', 'severity': 'info'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "repositories_blacklist", "audience": "sysadmin", "detail": {"remediations": [{"context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "type": "hint"}]}, "groups": ["repository", "failure"], "hostname": "managed-node01", "id": "eb00dfd4b19561998061dd8d4554f258d0a68aa79e3e950614bf450671747149", "key": "1b9132cb2362ae7830e48eee7811be9527747de8", "severity": "info", "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms", "timeStamp": "2025-12-18T16:08:17.398541Z", "title": "Excluded target system repositories"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['repository'], 'title': 'Packages available in excluded repositories will not be installed', 'timeStamp': '2025-12-18T16:08:19.997376Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'python3-pyxattr'}, {'scheme': 'package', 'title': 'rpcgen'}]}, 'actor': 'pes_events_scanner', 'summary': '2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled "Excluded target system repositories" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)', 'audience': 'sysadmin', 'key': '2437e204808f987477c0e9be8e4c95b3a87a9f3e', 'id': 'fb5b080da49e736824977b0ffdc835d6af685ac8d0afd5a16c9335d934af387f', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "pes_events_scanner", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "python3-pyxattr"}, {"scheme": "package", "title": "rpcgen"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "fb5b080da49e736824977b0ffdc835d6af685ac8d0afd5a16c9335d934af387f", "key": "2437e204808f987477c0e9be8e4c95b3a87a9f3e", "severity": "high", "summary": "2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", "timeStamp": "2025-12-18T16:08:19.997376Z", "title": "Packages available in excluded repositories will not be installed"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['tools'], 'title': 'Grep has incompatible changes in the next major version', 'timeStamp': '2025-12-18T16:08:20.252640Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'grep'}], 'remediations': [{'type': 'hint', 'context': 'Please update your scripts to be compatible with the changes.'}]}, 'actor': 'checkgrep', 'summary': 'If a file contains data improperly encoded for the current locale, and this is discovered before any of the file\'s contents are output, grep now treats the file as binary.\nThe \'grep -P\' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.\nIn locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.\nWhen searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.\nThe \'grep -z\' no longer automatically treats the byte \'\\200\' as binary data.\nContext no longer excludes selected lines omitted because of -m. For example, \'grep "^" -m1 -A1\' now outputs the first two input lines, not just the first line.\n', 'audience': 'sysadmin', 'key': '94665a499e2eeee35eca3e7093a7abe183384b16', 'id': 'de7b5e22f23344bc4d72b9b0caac92cda15a094c68952b1ee3d75c4d4ade0dfe', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "checkgrep", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "grep"}], "remediations": [{"context": "Please update your scripts to be compatible with the changes.", "type": "hint"}]}, "groups": ["tools"], "hostname": "managed-node01", "id": "de7b5e22f23344bc4d72b9b0caac92cda15a094c68952b1ee3d75c4d4ade0dfe", "key": "94665a499e2eeee35eca3e7093a7abe183384b16", "severity": "low", "summary": "If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.\nThe 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.\nIn locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.\nWhen searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.\nThe 'grep -z' no longer automatically treats the byte '\\200' as binary data.\nContext no longer excludes selected lines omitted because of -m. For example, 'grep \"^\" -m1 -A1' now outputs the first two input lines, not just the first line.\n", "timeStamp": "2025-12-18T16:08:20.252640Z", "title": "Grep has incompatible changes in the next major version"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['python'], 'title': 'Difference in Python versions and support in RHEL 8', 'timeStamp': '2025-12-18T16:08:20.292089Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'python'}, {'scheme': 'package', 'title': 'python2'}, {'scheme': 'package', 'title': 'python3'}], 'external': [{'url': 'https://red.ht/rhel-8-python', 'title': 'Difference in Python versions and support in RHEL 8'}], 'remediations': [{'type': 'hint', 'context': 'Please run "alternatives --set python /usr/bin/python3" after upgrade'}]}, 'actor': 'python_inform_user', 'summary': "In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", 'audience': 'developer', 'key': '0c98585b1d8d252eb540bf61560094f3495351f5', 'id': 'bcf11fdb264a0688181b1aa36c1f3d11c06021a6ef0a3e2a5c824722650840f6', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "python_inform_user", "audience": "developer", "detail": {"external": [{"title": "Difference in Python versions and support in RHEL 8", "url": "https://red.ht/rhel-8-python"}], "related_resources": [{"scheme": "package", "title": "python"}, {"scheme": "package", "title": "python2"}, {"scheme": "package", "title": "python3"}], "remediations": [{"context": "Please run \"alternatives --set python /usr/bin/python3\" after upgrade", "type": "hint"}]}, "groups": ["python"], "hostname": "managed-node01", "id": "bcf11fdb264a0688181b1aa36c1f3d11c06021a6ef0a3e2a5c824722650840f6", "key": "0c98585b1d8d252eb540bf61560094f3495351f5", "severity": "high", "summary": "In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", "timeStamp": "2025-12-18T16:08:20.292089Z", "title": "Difference in Python versions and support in RHEL 8"}, "skip_reason": "Conditional result was False"} ok: [managed-node01] => (item={'groups': ['kernel', 'drivers', 'inhibitor'], 'title': 'Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.', 'timeStamp': '2025-12-18T16:08:20.802663Z', 'hostname': 'managed-node01', 'detail': {'external': [{'url': 'https://access.redhat.com/solutions/6971716', 'title': 'Leapp preupgrade getting "Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed." '}, {'url': 'https://access.redhat.com/solutions/5436131', 'title': 'Leapp upgrade fail with error "Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."'}]}, 'actor': 'check_detected_devices_and_drivers', 'summary': 'Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n', 'audience': 'sysadmin', 'key': 'f08a07da902958defa4f5c2699fae9ec2eb67c5b', 'id': 'e3f427823b8355567496978da8f6ad5846cb29138edef4920e193c0f3ae92a64', 'severity': 'high'}) => {"ansible_facts": {"leapp_inhibitors": [{"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "e3f427823b8355567496978da8f6ad5846cb29138edef4920e193c0f3ae92a64", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-12-18T16:08:20.802663Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}], "upgrade_inhibited": true}, "ansible_loop_var": "item", "changed": false, "item": {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "e3f427823b8355567496978da8f6ad5846cb29138edef4920e193c0f3ae92a64", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-12-18T16:08:20.802663Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}} skipping: [managed-node01] => (item={'groups': ['filesystem'], 'title': 'Detected broken systemd symlinks for non-existing services', 'timeStamp': '2025-12-18T16:08:21.029599Z', 'hostname': 'managed-node01', 'detail': {'remediations': [{'type': 'hint', 'context': 'Remove the invalid symlinks before the upgrade.'}, {'type': 'command', 'context': ['/usr/bin/rm', '/etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service']}]}, 'actor': 'check_systemd_broken_symlinks', 'summary': 'Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:\n - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service', 'audience': 'sysadmin', 'key': 'be2083fee03f5f0a708fd193d82d2fe20aee7217', 'id': 'dd082b42d5de8e94951d316696bc75fbd6093982ee2d8935d940146bb286560a', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_systemd_broken_symlinks", "audience": "sysadmin", "detail": {"remediations": [{"context": "Remove the invalid symlinks before the upgrade.", "type": "hint"}, {"context": ["/usr/bin/rm", "/etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service"], "type": "command"}]}, "groups": ["filesystem"], "hostname": "managed-node01", "id": "dd082b42d5de8e94951d316696bc75fbd6093982ee2d8935d940146bb286560a", "key": "be2083fee03f5f0a708fd193d82d2fe20aee7217", "severity": "low", "summary": "Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:\n - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", "timeStamp": "2025-12-18T16:08:21.029599Z", "title": "Detected broken systemd symlinks for non-existing services"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['repository'], 'title': 'Some enabled RPM repositories are unknown to Leapp', 'timeStamp': '2025-12-18T16:08:21.264596Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'libsolv'}, {'scheme': 'package', 'title': 'python-perf'}, {'scheme': 'package', 'title': 'kernel-tools-libs'}, {'scheme': 'package', 'title': 'libreport-filesystem'}, {'scheme': 'package', 'title': 'json-glib'}, {'scheme': 'package', 'title': 'librepo'}, {'scheme': 'package', 'title': 'kernel-tools'}, {'scheme': 'repository', 'title': 'rhel'}], 'remediations': [{'type': 'hint', 'context': 'You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket'}]}, 'actor': 'check_skipped_repositories', 'summary': 'The following repositories with Red Hat-signed packages are unknown to Leapp:\n- rhel\nAnd the following packages installed from those repositories may not be upgraded:\n- libsolv\n- python-perf\n- kernel-tools-libs\n- libreport-filesystem\n- json-glib\n- librepo\n- kernel-tools', 'audience': 'sysadmin', 'key': '8e89e20c645cea600b240156071d81c64daab7ad', 'id': '9e123c8d868e5d97f94972017035575313929da5b2d0b2619b5ccc5c1eedc63a', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_skipped_repositories", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "libsolv"}, {"scheme": "package", "title": "python-perf"}, {"scheme": "package", "title": "kernel-tools-libs"}, {"scheme": "package", "title": "libreport-filesystem"}, {"scheme": "package", "title": "json-glib"}, {"scheme": "package", "title": "librepo"}, {"scheme": "package", "title": "kernel-tools"}, {"scheme": "repository", "title": "rhel"}], "remediations": [{"context": "You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket", "type": "hint"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "9e123c8d868e5d97f94972017035575313929da5b2d0b2619b5ccc5c1eedc63a", "key": "8e89e20c645cea600b240156071d81c64daab7ad", "severity": "low", "summary": "The following repositories with Red Hat-signed packages are unknown to Leapp:\n- rhel\nAnd the following packages installed from those repositories may not be upgraded:\n- libsolv\n- python-perf\n- kernel-tools-libs\n- libreport-filesystem\n- json-glib\n- librepo\n- kernel-tools", "timeStamp": "2025-12-18T16:08:21.264596Z", "title": "Some enabled RPM repositories are unknown to Leapp"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['boot'], 'title': 'GRUB2 core will be automatically updated during the upgrade', 'timeStamp': '2025-12-18T16:08:21.477826Z', 'hostname': 'managed-node01', 'actor': 'check_grub_core', 'summary': 'On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running "grub2-install" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.', 'audience': 'sysadmin', 'key': 'ac7030e05d2ee248d34f08a9fa040b352bc410a3', 'id': '085356ec0993c463eb136e1b9c1e791825b4c82656814cbf1cc04fc6354d7772', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_grub_core", "audience": "sysadmin", "groups": ["boot"], "hostname": "managed-node01", "id": "085356ec0993c463eb136e1b9c1e791825b4c82656814cbf1cc04fc6354d7772", "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", "severity": "high", "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", "timeStamp": "2025-12-18T16:08:21.477826Z", "title": "GRUB2 core will be automatically updated during the upgrade"}, "skip_reason": "Conditional result was False"} ok: [managed-node01] => (item={'groups': ['filesystem', 'network', 'inhibitor'], 'title': "Use of NFS detected. Upgrade can't proceed", 'timeStamp': '2025-12-18T16:08:21.837113Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'file', 'title': '/etc/fstab'}], 'external': [{'url': 'https://access.redhat.com/solutions/6964006', 'title': 'Why does leapp upgrade fail on detecting NFS during upgrade?'}], 'remediations': [{'type': 'hint', 'context': 'Disable NFS temporarily for the upgrade if possible.'}]}, 'actor': 'check_nfs', 'summary': 'NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n', 'audience': 'sysadmin', 'key': '9881b25faceeeaa7a6478bcdac29afd7f6baaaed', 'id': '9e3e3cf2d2be70f483b7f3a5f63cfab6d2001a75cd139741f8357a5f065cf2f2', 'severity': 'high'}) => {"ansible_facts": {"leapp_inhibitors": [{"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "e3f427823b8355567496978da8f6ad5846cb29138edef4920e193c0f3ae92a64", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-12-18T16:08:20.802663Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "9e3e3cf2d2be70f483b7f3a5f63cfab6d2001a75cd139741f8357a5f065cf2f2", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2025-12-18T16:08:21.837113Z", "title": "Use of NFS detected. Upgrade can't proceed"}], "upgrade_inhibited": true}, "ansible_loop_var": "item", "changed": false, "item": {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "9e3e3cf2d2be70f483b7f3a5f63cfab6d2001a75cd139741f8357a5f065cf2f2", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2025-12-18T16:08:21.837113Z", "title": "Use of NFS detected. Upgrade can't proceed"}} skipping: [managed-node01] => (item={'groups': ['authentication', 'security', 'tools'], 'title': 'Module pam_pkcs11 will be removed from PAM configuration', 'timeStamp': '2025-12-18T16:08:22.261862Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'sssd'}], 'remediations': [{'type': 'hint', 'context': 'Configure SSSD to replace pam_pkcs11'}]}, 'actor': 'removed_pam_modules_check', 'summary': 'Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.', 'audience': 'sysadmin', 'key': 'bf47e7305d6805e8bbeaa7593cf01e38030c23f3', 'id': '737879c8399731e7817d8733ddc81274f6bbfff74b172c0f4e3970a403586490', 'severity': 'medium'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "removed_pam_modules_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "sssd"}], "remediations": [{"context": "Configure SSSD to replace pam_pkcs11", "type": "hint"}]}, "groups": ["authentication", "security", "tools"], "hostname": "managed-node01", "id": "737879c8399731e7817d8733ddc81274f6bbfff74b172c0f4e3970a403586490", "key": "bf47e7305d6805e8bbeaa7593cf01e38030c23f3", "severity": "medium", "summary": "Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.", "timeStamp": "2025-12-18T16:08:22.261862Z", "title": "Module pam_pkcs11 will be removed from PAM configuration"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['services', 'time management'], 'title': 'chrony using default configuration', 'timeStamp': '2025-12-18T16:08:23.486703Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'ntpd'}, {'scheme': 'package', 'title': 'chrony'}, {'scheme': 'file', 'title': '/etc/chrony.conf'}]}, 'actor': 'check_chrony', 'summary': 'default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives', 'audience': 'sysadmin', 'key': 'c4222ebd18730a76f6bc7b3b66df898b106e6554', 'id': '946f87754df9dae8dfff2e91cd4b80dc01379843fbeb16a275400ad49d66feaa', 'severity': 'medium'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_chrony", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "ntpd"}, {"scheme": "package", "title": "chrony"}, {"scheme": "file", "title": "/etc/chrony.conf"}]}, "groups": ["services", "time management"], "hostname": "managed-node01", "id": "946f87754df9dae8dfff2e91cd4b80dc01379843fbeb16a275400ad49d66feaa", "key": "c4222ebd18730a76f6bc7b3b66df898b106e6554", "severity": "medium", "summary": "default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives", "timeStamp": "2025-12-18T16:08:23.486703Z", "title": "chrony using default configuration"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['upgrade process', 'sanity'], 'title': 'Upgrade is unsupported', 'timeStamp': '2025-12-18T16:08:23.822646Z', 'hostname': 'managed-node01', 'actor': 'unsupported_upgrade_check', 'summary': 'Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.\n', 'audience': 'sysadmin', 'key': '9e5088e3c1f371e020ec777c3d86578f4be143cf', 'id': 'b8bddc307355cc09c7386a52943527de8eb95ae904b3b116cfcbbc22ac2c6369', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "unsupported_upgrade_check", "audience": "sysadmin", "groups": ["upgrade process", "sanity"], "hostname": "managed-node01", "id": "b8bddc307355cc09c7386a52943527de8eb95ae904b3b116cfcbbc22ac2c6369", "key": "9e5088e3c1f371e020ec777c3d86578f4be143cf", "severity": "high", "summary": "Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.\n", "timeStamp": "2025-12-18T16:08:23.822646Z", "title": "Upgrade is unsupported"}, "skip_reason": "Conditional result was False"} ok: [managed-node01] => (item={'groups': ['filesystem', 'network', 'inhibitor'], 'title': "Use of CIFS detected. Upgrade can't proceed", 'timeStamp': '2025-12-18T16:08:23.865954Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'file', 'title': '/etc/fstab'}], 'external': [{'url': 'https://access.redhat.com/solutions/6964304', 'title': 'Leapp upgrade failed with error "Inhibitor: Use of CIFS detected. Upgrade cannot proceed"'}], 'remediations': [{'type': 'hint', 'context': 'Comment out CIFS entries to proceed with the upgrade.'}]}, 'actor': 'check_cifs', 'summary': 'CIFS is currently not supported by the inplace upgrade.', 'audience': 'sysadmin', 'key': 'd0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a', 'id': '86bf2693d7906c2175b864de82e00a3383df112c7b72028999a9f8d631129b1b', 'severity': 'high'}) => {"ansible_facts": {"leapp_inhibitors": [{"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "e3f427823b8355567496978da8f6ad5846cb29138edef4920e193c0f3ae92a64", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-12-18T16:08:20.802663Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "9e3e3cf2d2be70f483b7f3a5f63cfab6d2001a75cd139741f8357a5f065cf2f2", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2025-12-18T16:08:21.837113Z", "title": "Use of NFS detected. Upgrade can't proceed"}, {"actor": "check_cifs", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "86bf2693d7906c2175b864de82e00a3383df112c7b72028999a9f8d631129b1b", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2025-12-18T16:08:23.865954Z", "title": "Use of CIFS detected. Upgrade can't proceed"}], "upgrade_inhibited": true}, "ansible_loop_var": "item", "changed": false, "item": {"actor": "check_cifs", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "86bf2693d7906c2175b864de82e00a3383df112c7b72028999a9f8d631129b1b", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2025-12-18T16:08:23.865954Z", "title": "Use of CIFS detected. Upgrade can't proceed"}} skipping: [managed-node01] => (item={'groups': ['authentication', 'security', 'tools'], 'title': 'Current PAM and nsswitch.conf configuration will be kept.', 'timeStamp': '2025-12-18T16:08:23.944032Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'authselect'}, {'scheme': 'package', 'title': 'authconfig'}, {'scheme': 'file', 'title': '/etc/nsswitch.conf'}]}, 'actor': 'authselect_check', 'summary': 'There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.', 'audience': 'sysadmin', 'key': '40c4ab1da4a30dc1ca40e543f6385e1336d8810c', 'id': '81cca5a856b1c2cc54831e57d83d30a56336a28c3f3c752337d2b3e20135ad7a', 'severity': 'info'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "authselect_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "authselect"}, {"scheme": "package", "title": "authconfig"}, {"scheme": "file", "title": "/etc/nsswitch.conf"}]}, "groups": ["authentication", "security", "tools"], "hostname": "managed-node01", "id": "81cca5a856b1c2cc54831e57d83d30a56336a28c3f3c752337d2b3e20135ad7a", "key": "40c4ab1da4a30dc1ca40e543f6385e1336d8810c", "severity": "info", "summary": "There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.", "timeStamp": "2025-12-18T16:08:23.944032Z", "title": "Current PAM and nsswitch.conf configuration will be kept."}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['services', 'email'], 'title': 'Postfix has incompatible changes in the next major version', 'timeStamp': '2025-12-18T16:08:24.175162Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'postfix'}]}, 'actor': 'check_postfix', 'summary': 'Postfix 3.x has so called "compatibility safety net" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.\nThe backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.\nIt can be turned on by running: "postconf -e compatibility_level=0\nIt can be turned off by running: "postconf -e compatibility_level=2\n\nIn the Postfix MySQL database client, the default "option_group" value has changed to "client", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set "option_group" to the empty string.\n\nThe postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.\n\nPostfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to "auto", and introduces a new parameter "tls_eecdh_auto_curves" with the names of curves that may be negotiated.\n\nThe "master.cf" chroot default value has changed from "y" (yes) to "n" (no). This applies to master.cf services where chroot field is not explicitly specified.\n\nThe "append_dot_mydomain" default value has changed from "yes" to "no". You may need changing it to "yes" if senders cannot use complete domain names in e-mail addresses.\n\nThe "relay_domains" default value has changed from "$mydestination" to the empty value. This could result in unexpected "Relay access denied" errors or ETRN errors, because now will postfix by default relay only for the localhost.\n\nThe "mynetworks_style" default value has changed from "subnet" to "host". This parameter is used to implement the "permit_mynetworks" feature. The change could result in unexpected "access denied" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.\n\nPostfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.\n', 'audience': 'sysadmin', 'key': '5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33', 'id': '56740ca449faa524697fda034bd04291fc2ece4ad98718f8b11cdd41ba13587a', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_postfix", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "postfix"}]}, "groups": ["services", "email"], "hostname": "managed-node01", "id": "56740ca449faa524697fda034bd04291fc2ece4ad98718f8b11cdd41ba13587a", "key": "5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33", "severity": "low", "summary": "Postfix 3.x has so called \"compatibility safety net\" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.\nThe backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.\nIt can be turned on by running: \"postconf -e compatibility_level=0\nIt can be turned off by running: \"postconf -e compatibility_level=2\n\nIn the Postfix MySQL database client, the default \"option_group\" value has changed to \"client\", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set \"option_group\" to the empty string.\n\nThe postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.\n\nPostfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to \"auto\", and introduces a new parameter \"tls_eecdh_auto_curves\" with the names of curves that may be negotiated.\n\nThe \"master.cf\" chroot default value has changed from \"y\" (yes) to \"n\" (no). This applies to master.cf services where chroot field is not explicitly specified.\n\nThe \"append_dot_mydomain\" default value has changed from \"yes\" to \"no\". You may need changing it to \"yes\" if senders cannot use complete domain names in e-mail addresses.\n\nThe \"relay_domains\" default value has changed from \"$mydestination\" to the empty value. This could result in unexpected \"Relay access denied\" errors or ETRN errors, because now will postfix by default relay only for the localhost.\n\nThe \"mynetworks_style\" default value has changed from \"subnet\" to \"host\". This parameter is used to implement the \"permit_mynetworks\" feature. The change could result in unexpected \"access denied\" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.\n\nPostfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.\n", "timeStamp": "2025-12-18T16:08:24.175162Z", "title": "Postfix has incompatible changes in the next major version"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['selinux', 'security'], 'title': 'SElinux relabeling will be scheduled', 'timeStamp': '2025-12-18T16:08:24.752879Z', 'hostname': 'managed-node01', 'actor': 'check_se_linux', 'summary': 'SElinux relabeling will be scheduled as the status is permissive/enforcing.', 'audience': 'sysadmin', 'key': '8fb81863f8413bd617c2a55b69b8e10ff03d7c72', 'id': '884fb6f6fa9617d1f65b5d6a06557163ae3f8bc93bdb9f69e989e6619f08c08d', 'severity': 'info'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_se_linux", "audience": "sysadmin", "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "884fb6f6fa9617d1f65b5d6a06557163ae3f8bc93bdb9f69e989e6619f08c08d", "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", "severity": "info", "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", "timeStamp": "2025-12-18T16:08:24.752879Z", "title": "SElinux relabeling will be scheduled"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['selinux', 'security'], 'title': 'SElinux will be set to permissive mode', 'timeStamp': '2025-12-18T16:08:24.756673Z', 'hostname': 'managed-node01', 'detail': {'remediations': [{'type': 'hint', 'context': 'Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the "/root/tmp_leapp_py3" SElinux warnings.'}]}, 'actor': 'check_se_linux', 'summary': 'SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.', 'audience': 'sysadmin', 'key': '39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f', 'id': 'b9f5aa541073971ca2bf084cbd44886ce9f0a9615d159296036541aba83deffb', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_se_linux", "audience": "sysadmin", "detail": {"remediations": [{"context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.", "type": "hint"}]}, "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "b9f5aa541073971ca2bf084cbd44886ce9f0a9615d159296036541aba83deffb", "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", "severity": "low", "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", "timeStamp": "2025-12-18T16:08:24.756673Z", "title": "SElinux will be set to permissive mode"}, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : parse_leapp_report | Collect inhibitors] ************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:44 ok: [managed-node01] => {"changed": false, "cmd": ["awk", "/\\(inhibitor\\)/,/^-------/", "/var/log/leapp/leapp-report.txt"], "delta": "0:00:00.004122", "end": "2025-12-18 11:08:48.655115", "failed_when_result": false, "msg": "", "rc": 0, "start": "2025-12-18 11:08:48.650993", "stderr": "", "stderr_lines": [], "stdout": "Risk Factor: high (inhibitor)\nTitle: Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\nSummary: Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n\nRelated links:\n - Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" : https://access.redhat.com/solutions/6971716\n - Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\": https://access.redhat.com/solutions/5436131\nKey: f08a07da902958defa4f5c2699fae9ec2eb67c5b\n----------------------------------------\nRisk Factor: high (inhibitor)\nTitle: Use of NFS detected. Upgrade can't proceed\nSummary: NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n\nRelated links:\n - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006\nRemediation: [hint] Disable NFS temporarily for the upgrade if possible.\nKey: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed\n----------------------------------------\nRisk Factor: high (inhibitor)\nTitle: Use of CIFS detected. Upgrade can't proceed\nSummary: CIFS is currently not supported by the inplace upgrade.\nRelated links:\n - Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\": https://access.redhat.com/solutions/6964304\nRemediation: [hint] Comment out CIFS entries to proceed with the upgrade.\nKey: d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a\n----------------------------------------", "stdout_lines": ["Risk Factor: high (inhibitor)", "Title: Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", "Summary: Support for the following RHEL 7 device drivers has been removed in RHEL 8:", " - pata_acpi", "", "Related links:", " - Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" : https://access.redhat.com/solutions/6971716", " - Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\": https://access.redhat.com/solutions/5436131", "Key: f08a07da902958defa4f5c2699fae9ec2eb67c5b", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Use of NFS detected. Upgrade can't proceed", "Summary: NFS is currently not supported by the inplace upgrade.", "We have found NFS usage at the following locations:", "- NFS shares found in /etc/fstab:", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat", " - nest.test.redhat.com:/mnt/qa /mnt/qa", " - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive", " - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch", "", "Related links:", " - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006", "Remediation: [hint] Disable NFS temporarily for the upgrade if possible.", "Key: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Use of CIFS detected. Upgrade can't proceed", "Summary: CIFS is currently not supported by the inplace upgrade.", "Related links:", " - Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\": https://access.redhat.com/solutions/6964304", "Remediation: [hint] Comment out CIFS entries to proceed with the upgrade.", "Key: d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "----------------------------------------"]} TASK [infra.leapp.common : parse_leapp_report | Collect high errors] *********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:53 ok: [managed-node01] => {"changed": false, "cmd": ["awk", "/high \\(error\\)/,/^-------/", "/var/log/leapp/leapp-report.txt"], "delta": "0:00:00.003856", "end": "2025-12-18 11:08:48.940289", "failed_when_result": false, "msg": "", "rc": 0, "start": "2025-12-18 11:08:48.936433", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} TASK [infra.leapp.analysis : Set stats for leapp_inhibitors] ******************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:17 ok: [managed-node01] => {"ansible_stats": {"aggregate": true, "data": {"leapp_inhibitors": [{"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "e3f427823b8355567496978da8f6ad5846cb29138edef4920e193c0f3ae92a64", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-12-18T16:08:20.802663Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "9e3e3cf2d2be70f483b7f3a5f63cfab6d2001a75cd139741f8357a5f065cf2f2", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2025-12-18T16:08:21.837113Z", "title": "Use of NFS detected. Upgrade can't proceed"}, {"actor": "check_cifs", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "86bf2693d7906c2175b864de82e00a3383df112c7b72028999a9f8d631129b1b", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2025-12-18T16:08:23.865954Z", "title": "Use of CIFS detected. Upgrade can't proceed"}]}, "per_host": false}, "changed": false} TASK [infra.leapp.analysis : Notify analysis report is done handler] *********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:22 NOTIFIED HANDLER infra.leapp.analysis : Preupgrade analysis report is done for managed-node01 NOTIFIED HANDLER infra.leapp.analysis : Display inhibitors for managed-node01 NOTIFIED HANDLER infra.leapp.analysis : Display errors for managed-node01 changed: [managed-node01] => {"changed": true, "msg": "All assertions passed"} TASK [common_upgrade_tasks | Flush handlers] *********************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:25 META: triggered running handlers for managed-node01 RUNNING HANDLER [infra.leapp.common : Check for log file] ********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:3 ok: [managed-node01] => {"changed": false, "stat": {"atime": 1766074056.706784, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 40, "charset": "us-ascii", "checksum": "d47d7657a9c68f654bbcb04122df82c106d4c1ff", "ctime": 1766074105.1558073, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 419430853, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1766074105.1558073, "nlink": 1, "path": "/var/log/ripu/ripu.log", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 18197, "uid": 0, "version": "18446744073571942679", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} RUNNING HANDLER [infra.leapp.common : Add end time to log file] **************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:9 changed: [managed-node01] => {"backup": "", "changed": true, "msg": "line added"} RUNNING HANDLER [infra.leapp.common : Slurp ripu.log file] ********************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:19 ok: [managed-node01] => {"changed": false, "content": "RIPU preupgrade analysis
Job started at 2025-12-18T16:07:35Z

============================================================
                    UNSUPPORTED UPGRADE                     
============================================================

Variable LEAPP_UNSUPPORTED has been detected. Proceeding at your own risk.
Development variables have been detected:
- LEAPP_DEVEL_RPMS_ALL_SIGNED=1

============================================================
                    UNSUPPORTED UPGRADE                     
============================================================

==> Processing phase `configuration_phase`
====> * ipu_workflow_config
        IPU workflow config actor
==> Processing phase `FactsCollection`
====> * get_enabled_modules
        Provides data about which module streams are enabled on the source system.
====> * system_facts
        Provides data about many facts from system.
====> * scan_grub_config
        Scan grub configuration files for errors.
====> * udevadm_info
        Produces data exported by the "udevadm info" command.
====> * repository_mapping
        Produces message containing repository mapping based on provided file.
====> * root_scanner
        Scan the system root directory and produce a message containing
====> * scan_kernel_cmdline
        No documentation has been provided for the scan_kernel_cmdline actor.
====> * rpm_scanner
        Provides data about installed RPM Packages.
Loaded plugins: product-id, subscription-manager

This system is not registered with an entitlement server. You can use subscription-manager to register.

====> * source_boot_loader_scanner
        Scans the boot loader configuration on the source system.
====> * scanclienablerepo
        Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.
====> * authselect_scanner
        Detect what authselect configuration should be suggested to administrator.
====> * scan_systemd_source
        Provides info about systemd on the source system
====> * sssd_facts
        Check SSSD configuration for changes in RHEL8 and report them in model.
====> * scan_custom_modifications_actor
        Collects information about files in leapp directories that have been modified or newly added.
====> * scan_files_for_target_userspace
        Scan the source system and identify files that will be copied into the target userspace when it is created.
====> * scan_custom_repofile
        Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.
====> * load_device_driver_deprecation_data
        Loads deprecation data for drivers and devices (PCI & CPU)
====> * scan_source_files
        Scan files (explicitly specified) of the source system.
====> * removed_pam_modules_scanner
        Scan PAM configuration for modules that are not available in RHEL-8.
====> * common_leapp_dracut_modules
        Influences the generation of the initram disk
====> * read_openssh_config
        Collect information about the OpenSSH configuration.
====> * sctp_read_status
        Determines whether or not the SCTP kernel module might be wanted.
====> * tcp_wrappers_config_read
        Parse tcp_wrappers configuration files /etc/hosts.{allow,deny}.
====> * scan_fips
        Determine whether the source system has FIPS enabled.
====> * register_yum_adjustment
        Registers a workaround which will adjust the yum directories during the upgrade.
====> * pci_devices_scanner
        Provides data about existing PCI Devices.
====> * copy_dnf_conf_into_target_userspace
        Copy dnf.conf into target userspace
====> * selinuxcontentscanner
        Scan the system for any SELinux customizations
====> * distribution_signed_rpm_scanner
        Provide data about distribution signed & unsigned RPM packages.
====> * scanzfcp
        In case of s390x architecture, check whether ZFCP is used.
====> * vsftpd_config_read
        Reads vsftpd configuration files (/etc/vsftpd/*.conf) and extracts necessary information.
====> * scan_grub_device_name
        Find the name of the block devices where GRUB is located
====> * scanmemory
        Scan Memory of the machine.
====> * scan_subscription_manager_info
        Scans the current system for subscription manager information
====> * used_repository_scanner
        Scan used enabled repositories
====> * detect_kernel_drivers
        Matches all currently loaded kernel drivers against known deprecated and removed drivers.
====> * storage_scanner
        Provides data about storage settings.
====> * pam_modules_scanner
        Scan the pam directory for services and modules used in them
====> * transaction_workarounds
        Provides additional RPM transaction tasks based on bundled RPM packages.
====> * scan_pkg_manager
        Provides data about package manager (yum/dnf)
====> * firewalld_facts_actor
        Provide data about firewalld
====> * checkrhui
        Check if system is using RHUI infrastructure (on public cloud) and send messages to
====> * scan_sap_hana
        Gathers information related to SAP HANA instances on the system.
====> * check_grub_legacy
        Check whether GRUB Legacy is installed in the MBR.
====> * scandasd
        In case of s390x architecture, check whether DASD is used.
====> * scan_source_kernel
        Scan the source system kernel.
====> * scan_target_os_image
        Scans the provided target OS ISO image to use as a content source for the IPU, if any.
====> * satellite_upgrade_facts
        Report which Satellite packages require updates and how to handle PostgreSQL data
====> * network_manager_read_config
        Provides data about NetworkManager configuration.
====> * remove_obsolete_gpg_keys
        Remove obsoleted RPM GPG keys.
====> * persistentnetnames
        Get network interface information for physical ethernet interfaces of the original system.
====> * get_installed_desktops
        Actor checks if kde or gnome desktop environments
====> * scancpu
        Scan CPUs of the machine.
====> * trusted_gpg_keys_scanner
        Scan for trusted GPG keys.
====> * repositories_blacklist
        Exclude target repositories provided by Red Hat without support.
====> * biosdevname
        Enable biosdevname on the target RHEL system if all interfaces on the source RHEL
====> * check_kde_apps
        Actor checks which KDE apps are installed.
====> * rpm_transaction_config_tasks_collector
        Provides additional RPM transaction tasks from /etc/leapp/transaction.
====> * ipa_scanner
        Scan system for ipa-client and ipa-server status
====> * scan_grub_device_partition_layout
        Scan all identified GRUB devices for their partition layout.
====> * quagga_daemons
        Active quagga daemons check.
====> * multipath_conf_read
        Read multipath configuration files and extract the necessary information
====> * scan_dynamic_linker_configuration
        Scan the dynamic linker configuration and find modifications.
====> * cups_scanner
        Gather facts about CUPS features which needs to be migrated
====> * spamassassin_config_read
        Reads spamc configuration (/etc/mail/spamassassin/spamc.conf), the
====> * xfs_info_scanner
        This actor scans all mounted mountpoints for XFS information
====> * persistentnetnamesdisable
        Disable systemd-udevd persistent network naming on machine with single eth0 NIC
====> * pes_events_scanner
        Provides data about package events from Package Evolution Service.
====> * setuptargetrepos
        Produces list of repositories that should be available to be used by Upgrade process.
==> Processing phase `Checks`
====> * open_ssh_algorithms
        OpenSSH configuration does not contain any unsupported cryptographic algorithms.
====> * checkgrep
        Check if Grep is installed. If yes, write information about non-compatible changes.
====> * python_inform_user
        This actor informs the user of differences in Python version and support in RHEL 8.
====> * check_os_release
        Check if the current RHEL minor version is supported. If not, inhibit the upgrade process.
====> * zipl_check_boot_entries
        Inhibits the upgrade if a problematic Zipl configuration is detected on the system.
====> * check_btrfs
        Check if Btrfs filesystem is in use. If yes, inhibit the upgrade process.
====> * open_ssh_use_privilege_separation
        UsePrivilegeSeparation configuration option was removed.
====> * check_rhsmsku
        Ensure the system is subscribed to the subscription manager
====> * postgresql_check
        Actor checking for presence of PostgreSQL installation.
====> * check_kde_gnome
        Checks whether KDE is installed
====> * checkmemory
        The actor check the size of RAM against RHEL8 minimal hardware requirements
====> * check_detected_devices_and_drivers
        Checks whether or not detected devices and drivers are usable on the target system.
====> * check_root_symlinks
        Check if the symlinks /bin and /lib are relative, not absolute.
====> * openssh_permit_root_login
        OpenSSH no longer allows root logins with password.
====> * check_firewalld
        Check for certain firewalld configuration that may prevent an upgrade.
====> * check_ipa_server
        Check for ipa-server and inhibit upgrade
====> * detect_grub_config_error
        Check grub configuration for various errors.
====> * check_systemd_broken_symlinks
        Check whether some systemd symlinks are broken
====> * check_system_arch
        Check if system is running at a supported architecture. If no, inhibit the upgrade process.
====> * checkirssi
        Check if irssi is installed. If yes, write information about non-compatible changes.
====> * cups_check
        Reports changes in configuration between CUPS 1.6.3 and 2.2.6
====> * cephvolumescan
        Retrieves the list of encrypted Ceph OSD
====> * check_skipped_repositories
        Produces a report if any repositories enabled on the system are going to be skipped.
====> * multiple_package_versions
        Check for problematic 32bit packages installed together with 64bit ones.
====> * sssd_check
        Check SSSD configuration for changes in RHEL8 and report them.
====> * check_grub_core
        Check whether we are on legacy (BIOS) system and instruct Leapp to upgrade GRUB core
====> * check_consumed_assets
        Check whether Leapp is using correct data assets.
====> * quagga_report
        Checking for babeld on RHEL-7.
====> * check_yum_plugins_enabled
        Checks that the required yum plugins are enabled.
====> * check_boot_avail_space
        Check if at least 100Mib of available space on /boot. If not, inhibit the upgrade process.
====> * bacula_check
        Actor checking for presence of Bacula installation.
====> * check_nfs
        Check if NFS filesystem is in use. If yes, inhibit the upgrade process.
====> * spamassassin_config_check
        Reports changes in spamassassin between RHEL-7 and RHEL-8
====> * check_wireshark
        Report a couple of changes in tshark usage
====> * removed_pam_modules
        Check for modules that are not available in RHEL 8 anymore
====> * check_mount_options
        Check for mount options preventing the upgrade.
====> * check_insights_auto_register
        Checks if system can be automatically registered into Red Hat Insights
====> * vsftpd_config_check
        Checks whether the vsftpd configuration is supported in RHEL-8. Namely checks that
====> * check_etc_releasever
        Check releasever info and provide a guidance based on the facts
====> * removed_pam_modules_check
        Check if it is all right to disable PAM modules that are not in RHEL-8.
====> * check_openssl_conf
        Check whether the openssl configuration and openssl-IBMCA.
====> * sctp_checks
        Parses collected SCTP information and take necessary actions.
====> * check_fips
        Inhibit upgrade if FIPS is detected as enabled.
====> * checktargetrepos
        Check whether target yum repositories are specified.
====> * check_docker
        Checks if Docker is installed and warns about its deprecation in RHEL8.
====> * check_custom_modifications_actor
        Checks CustomModifications messages and produces a report about files in leapp directories that have been
====> * check_brltty
        Check if brltty is installed, check whether configuration update is needed.
====> * check_ntp
        Check if ntp and/or ntpdate configuration needs to be migrated.
====> * check_target_iso
        Check that the provided target ISO is a valid ISO image and is located on a persistent partition.
====> * check_sap_hana
        If SAP HANA has been detected, several checks are performed to ensure a successful upgrade.
====> * enable_device_cio_free_service
        Enables device_cio_free.service systemd service on s390x
====> * powertop
        Check if PowerTOP is installed. If yes, write information about non-compatible changes.
====> * check_fstab_mount_order
        Checks order of entries in /etc/fstab based on their mount point and inhibits upgrade if overshadowing is detected.
====> * checkhybridimage
        Check if the system is using Azure hybrid image.
====> * open_ssh_deprecated_directives_check
        Check for any deprecated directives in the OpenSSH configuration.
====> * checkfstabxfsoptions
        Check the FSTAB file for the deprecated / removed XFS mount options.
====> * tcp_wrappers_check
        Check the list of packages previously compiled with TCP wrappers support
====> * check_memcached
        Check for incompatible changes in memcached configuration.
====> * check_chrony
        Check for incompatible changes in chrony configuration.
====> * check_installed_debug_kernels
        Inhibit IPU (in-place upgrade) when multiple debug kernels are installed.
====> * checkdosfstools
        Check if dosfstools is installed. If yes, write information about non-compatible changes.
====> * checkacpid
        Check if acpid is installed. If yes, write information about non-compatible changes.
====> * check_installed_devel_kernels
        Inhibit IPU (in-place upgrade) when multiple devel kernels are installed.
====> * unsupported_upgrade_check
        Checks environment variables and produces a warning report if the upgrade is unsupported.
====> * check_cifs
        Check if CIFS filesystem is in use. If yes, inhibit the upgrade process.
====> * multipath_conf_check
        Checks whether the multipath configuration can be updated to RHEL-8 and
====> * authselect_check
        Confirm suggested authselect call from AuthselectScanner.
====> * check_bind
        Actor parsing BIND configuration and checking for known issues in it.
====> * check_sendmail
        Check if sendmail is installed, check whether configuration update is needed, inhibit upgrade if TCP wrappers
====> * check_postfix
        Check if postfix is installed, check whether configuration update is needed.
====> * check_dynamic_linker_configuration
        Check for customization of dynamic linker configuration.
====> * check_rpm_transaction_events
        Filter RPM transaction events based on installed RPM packages
====> * check_installed_kernels
        Inhibit IPU (in-place upgrade) when installed kernels conflict with a safe upgrade.
====> * efi_check_boot
        Adjust EFI boot entry for first reboot
====> * satellite_upgrade_check
        Check state of Satellite system before upgrade
====> * check_first_partition_offset
        Check whether the first partition starts at the offset >=1MiB.
====> * check_removed_envvars
        Check for usage of removed environment variables and inhibit the upgrade
====> * open_ssh_protocol
        Protocol configuration option was removed.
====> * red_hat_signed_rpm_check
        Check if there are packages not signed by Red Hat in use. If yes, warn user about it.
====> * check_ha_cluster
        Check if HA Cluster is in use. If yes, inhibit the upgrade process.
====> * check_persistent_mounts
        Check if mounts required to be persistent are mounted in persistent fashion.
====> * check_se_linux
        Check SELinux status and produce decision messages for further action.
====> * check_luks_and_inhibit
        Check if any encrypted partitions is in use. If yes, inhibit the upgrade process.
====> * check_skip_phase
        Skip all the subsequent phases until the report phase.
==> Processing phase `Reports`
====> * verify_check_results
        Check all dialogs and notify that user needs to make some choices.
====> * verify_check_results
        Check all generated results messages and notify user about them.

Debug output written to /var/log/leapp/leapp-preupgrade.log

============================================================
                      REPORT OVERVIEW                       
============================================================

Upgrade has been inhibited due to the following problems:
    1. Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.
    2. Use of NFS detected. Upgrade can't proceed
    3. Use of CIFS detected. Upgrade can't proceed

HIGH and MEDIUM severity reports:
    1. Packages available in excluded repositories will not be installed
    2. Difference in Python versions and support in RHEL 8
    3. GRUB2 core will be automatically updated during the upgrade
    4. Upgrade is unsupported
    5. Module pam_pkcs11 will be removed from PAM configuration
    6. chrony using default configuration

Reports summary:
    Errors:                      0
    Inhibitors:                  3
    HIGH severity reports:       4
    MEDIUM severity reports:     2
    LOW severity reports:        5
    INFO severity reports:       3

Before continuing, review the full report below for details about discovered problems and possible remediation instructions:
    A report has been generated at /var/log/leapp/leapp-report.txt
    A report has been generated at /var/log/leapp/leapp-report.json

============================================================
                   END OF REPORT OVERVIEW                   
============================================================

Answerfile has been generated at /var/log/leapp/answerfile
Job ended at 2025-12-18T16:08:49Z
", "encoding": "base64", "source": "/var/log/ripu/ripu.log"} RUNNING HANDLER [infra.leapp.common : Decode ripu.log file] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:26 ok: [managed-node01] => {"ansible_facts": {"ripu_log_file": ["RIPU preupgrade analysis", "Job started at 2025-12-18T16:07:35Z", "", "============================================================", " UNSUPPORTED UPGRADE ", "============================================================", "", "Variable LEAPP_UNSUPPORTED has been detected. Proceeding at your own risk.", "Development variables have been detected:", "- LEAPP_DEVEL_RPMS_ALL_SIGNED=1", "", "============================================================", " UNSUPPORTED UPGRADE ", "============================================================", "", "==> Processing phase `configuration_phase`", "====> * ipu_workflow_config", " IPU workflow config actor", "==> Processing phase `FactsCollection`", "====> * get_enabled_modules", " Provides data about which module streams are enabled on the source system.", "====> * system_facts", " Provides data about many facts from system.", "====> * scan_grub_config", " Scan grub configuration files for errors.", "====> * udevadm_info", " Produces data exported by the \"udevadm info\" command.", "====> * repository_mapping", " Produces message containing repository mapping based on provided file.", "====> * root_scanner", " Scan the system root directory and produce a message containing", "====> * scan_kernel_cmdline", " No documentation has been provided for the scan_kernel_cmdline actor.", "====> * rpm_scanner", " Provides data about installed RPM Packages.", "Loaded plugins: product-id, subscription-manager", "", "This system is not registered with an entitlement server. You can use subscription-manager to register.", "", "====> * source_boot_loader_scanner", " Scans the boot loader configuration on the source system.", "====> * scanclienablerepo", " Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.", "====> * authselect_scanner", " Detect what authselect configuration should be suggested to administrator.", "====> * scan_systemd_source", " Provides info about systemd on the source system", "====> * sssd_facts", " Check SSSD configuration for changes in RHEL8 and report them in model.", "====> * scan_custom_modifications_actor", " Collects information about files in leapp directories that have been modified or newly added.", "====> * scan_files_for_target_userspace", " Scan the source system and identify files that will be copied into the target userspace when it is created.", "====> * scan_custom_repofile", " Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.", "====> * load_device_driver_deprecation_data", " Loads deprecation data for drivers and devices (PCI & CPU)", "====> * scan_source_files", " Scan files (explicitly specified) of the source system.", "====> * removed_pam_modules_scanner", " Scan PAM configuration for modules that are not available in RHEL-8.", "====> * common_leapp_dracut_modules", " Influences the generation of the initram disk", "====> * read_openssh_config", " Collect information about the OpenSSH configuration.", "====> * sctp_read_status", " Determines whether or not the SCTP kernel module might be wanted.", "====> * tcp_wrappers_config_read", " Parse tcp_wrappers configuration files /etc/hosts.{allow,deny}.", "====> * scan_fips", " Determine whether the source system has FIPS enabled.", "====> * register_yum_adjustment", " Registers a workaround which will adjust the yum directories during the upgrade.", "====> * pci_devices_scanner", " Provides data about existing PCI Devices.", "====> * copy_dnf_conf_into_target_userspace", " Copy dnf.conf into target userspace", "====> * selinuxcontentscanner", " Scan the system for any SELinux customizations", "====> * distribution_signed_rpm_scanner", " Provide data about distribution signed & unsigned RPM packages.", "====> * scanzfcp", " In case of s390x architecture, check whether ZFCP is used.", "====> * vsftpd_config_read", " Reads vsftpd configuration files (/etc/vsftpd/*.conf) and extracts necessary information.", "====> * scan_grub_device_name", " Find the name of the block devices where GRUB is located", "====> * scanmemory", " Scan Memory of the machine.", "====> * scan_subscription_manager_info", " Scans the current system for subscription manager information", "====> * used_repository_scanner", " Scan used enabled repositories", "====> * detect_kernel_drivers", " Matches all currently loaded kernel drivers against known deprecated and removed drivers.", "====> * storage_scanner", " Provides data about storage settings.", "====> * pam_modules_scanner", " Scan the pam directory for services and modules used in them", "====> * transaction_workarounds", " Provides additional RPM transaction tasks based on bundled RPM packages.", "====> * scan_pkg_manager", " Provides data about package manager (yum/dnf)", "====> * firewalld_facts_actor", " Provide data about firewalld", "====> * checkrhui", " Check if system is using RHUI infrastructure (on public cloud) and send messages to", "====> * scan_sap_hana", " Gathers information related to SAP HANA instances on the system.", "====> * check_grub_legacy", " Check whether GRUB Legacy is installed in the MBR.", "====> * scandasd", " In case of s390x architecture, check whether DASD is used.", "====> * scan_source_kernel", " Scan the source system kernel.", "====> * scan_target_os_image", " Scans the provided target OS ISO image to use as a content source for the IPU, if any.", "====> * satellite_upgrade_facts", " Report which Satellite packages require updates and how to handle PostgreSQL data", "====> * network_manager_read_config", " Provides data about NetworkManager configuration.", "====> * remove_obsolete_gpg_keys", " Remove obsoleted RPM GPG keys.", "====> * persistentnetnames", " Get network interface information for physical ethernet interfaces of the original system.", "====> * get_installed_desktops", " Actor checks if kde or gnome desktop environments", "====> * scancpu", " Scan CPUs of the machine.", "====> * trusted_gpg_keys_scanner", " Scan for trusted GPG keys.", "====> * repositories_blacklist", " Exclude target repositories provided by Red Hat without support.", "====> * biosdevname", " Enable biosdevname on the target RHEL system if all interfaces on the source RHEL", "====> * check_kde_apps", " Actor checks which KDE apps are installed.", "====> * rpm_transaction_config_tasks_collector", " Provides additional RPM transaction tasks from /etc/leapp/transaction.", "====> * ipa_scanner", " Scan system for ipa-client and ipa-server status", "====> * scan_grub_device_partition_layout", " Scan all identified GRUB devices for their partition layout.", "====> * quagga_daemons", " Active quagga daemons check.", "====> * multipath_conf_read", " Read multipath configuration files and extract the necessary information", "====> * scan_dynamic_linker_configuration", " Scan the dynamic linker configuration and find modifications.", "====> * cups_scanner", " Gather facts about CUPS features which needs to be migrated", "====> * spamassassin_config_read", " Reads spamc configuration (/etc/mail/spamassassin/spamc.conf), the", "====> * xfs_info_scanner", " This actor scans all mounted mountpoints for XFS information", "====> * persistentnetnamesdisable", " Disable systemd-udevd persistent network naming on machine with single eth0 NIC", "====> * pes_events_scanner", " Provides data about package events from Package Evolution Service.", "====> * setuptargetrepos", " Produces list of repositories that should be available to be used by Upgrade process.", "==> Processing phase `Checks`", "====> * open_ssh_algorithms", " OpenSSH configuration does not contain any unsupported cryptographic algorithms.", "====> * checkgrep", " Check if Grep is installed. If yes, write information about non-compatible changes.", "====> * python_inform_user", " This actor informs the user of differences in Python version and support in RHEL 8.", "====> * check_os_release", " Check if the current RHEL minor version is supported. If not, inhibit the upgrade process.", "====> * zipl_check_boot_entries", " Inhibits the upgrade if a problematic Zipl configuration is detected on the system.", "====> * check_btrfs", " Check if Btrfs filesystem is in use. If yes, inhibit the upgrade process.", "====> * open_ssh_use_privilege_separation", " UsePrivilegeSeparation configuration option was removed.", "====> * check_rhsmsku", " Ensure the system is subscribed to the subscription manager", "====> * postgresql_check", " Actor checking for presence of PostgreSQL installation.", "====> * check_kde_gnome", " Checks whether KDE is installed", "====> * checkmemory", " The actor check the size of RAM against RHEL8 minimal hardware requirements", "====> * check_detected_devices_and_drivers", " Checks whether or not detected devices and drivers are usable on the target system.", "====> * check_root_symlinks", " Check if the symlinks /bin and /lib are relative, not absolute.", "====> * openssh_permit_root_login", " OpenSSH no longer allows root logins with password.", "====> * check_firewalld", " Check for certain firewalld configuration that may prevent an upgrade.", "====> * check_ipa_server", " Check for ipa-server and inhibit upgrade", "====> * detect_grub_config_error", " Check grub configuration for various errors.", "====> * check_systemd_broken_symlinks", " Check whether some systemd symlinks are broken", "====> * check_system_arch", " Check if system is running at a supported architecture. If no, inhibit the upgrade process.", "====> * checkirssi", " Check if irssi is installed. If yes, write information about non-compatible changes.", "====> * cups_check", " Reports changes in configuration between CUPS 1.6.3 and 2.2.6", "====> * cephvolumescan", " Retrieves the list of encrypted Ceph OSD", "====> * check_skipped_repositories", " Produces a report if any repositories enabled on the system are going to be skipped.", "====> * multiple_package_versions", " Check for problematic 32bit packages installed together with 64bit ones.", "====> * sssd_check", " Check SSSD configuration for changes in RHEL8 and report them.", "====> * check_grub_core", " Check whether we are on legacy (BIOS) system and instruct Leapp to upgrade GRUB core", "====> * check_consumed_assets", " Check whether Leapp is using correct data assets.", "====> * quagga_report", " Checking for babeld on RHEL-7.", "====> * check_yum_plugins_enabled", " Checks that the required yum plugins are enabled.", "====> * check_boot_avail_space", " Check if at least 100Mib of available space on /boot. If not, inhibit the upgrade process.", "====> * bacula_check", " Actor checking for presence of Bacula installation.", "====> * check_nfs", " Check if NFS filesystem is in use. If yes, inhibit the upgrade process.", "====> * spamassassin_config_check", " Reports changes in spamassassin between RHEL-7 and RHEL-8", "====> * check_wireshark", " Report a couple of changes in tshark usage", "====> * removed_pam_modules", " Check for modules that are not available in RHEL 8 anymore", "====> * check_mount_options", " Check for mount options preventing the upgrade.", "====> * check_insights_auto_register", " Checks if system can be automatically registered into Red Hat Insights", "====> * vsftpd_config_check", " Checks whether the vsftpd configuration is supported in RHEL-8. Namely checks that", "====> * check_etc_releasever", " Check releasever info and provide a guidance based on the facts", "====> * removed_pam_modules_check", " Check if it is all right to disable PAM modules that are not in RHEL-8.", "====> * check_openssl_conf", " Check whether the openssl configuration and openssl-IBMCA.", "====> * sctp_checks", " Parses collected SCTP information and take necessary actions.", "====> * check_fips", " Inhibit upgrade if FIPS is detected as enabled.", "====> * checktargetrepos", " Check whether target yum repositories are specified.", "====> * check_docker", " Checks if Docker is installed and warns about its deprecation in RHEL8.", "====> * check_custom_modifications_actor", " Checks CustomModifications messages and produces a report about files in leapp directories that have been", "====> * check_brltty", " Check if brltty is installed, check whether configuration update is needed.", "====> * check_ntp", " Check if ntp and/or ntpdate configuration needs to be migrated.", "====> * check_target_iso", " Check that the provided target ISO is a valid ISO image and is located on a persistent partition.", "====> * check_sap_hana", " If SAP HANA has been detected, several checks are performed to ensure a successful upgrade.", "====> * enable_device_cio_free_service", " Enables device_cio_free.service systemd service on s390x", "====> * powertop", " Check if PowerTOP is installed. If yes, write information about non-compatible changes.", "====> * check_fstab_mount_order", " Checks order of entries in /etc/fstab based on their mount point and inhibits upgrade if overshadowing is detected.", "====> * checkhybridimage", " Check if the system is using Azure hybrid image.", "====> * open_ssh_deprecated_directives_check", " Check for any deprecated directives in the OpenSSH configuration.", "====> * checkfstabxfsoptions", " Check the FSTAB file for the deprecated / removed XFS mount options.", "====> * tcp_wrappers_check", " Check the list of packages previously compiled with TCP wrappers support", "====> * check_memcached", " Check for incompatible changes in memcached configuration.", "====> * check_chrony", " Check for incompatible changes in chrony configuration.", "====> * check_installed_debug_kernels", " Inhibit IPU (in-place upgrade) when multiple debug kernels are installed.", "====> * checkdosfstools", " Check if dosfstools is installed. If yes, write information about non-compatible changes.", "====> * checkacpid", " Check if acpid is installed. If yes, write information about non-compatible changes.", "====> * check_installed_devel_kernels", " Inhibit IPU (in-place upgrade) when multiple devel kernels are installed.", "====> * unsupported_upgrade_check", " Checks environment variables and produces a warning report if the upgrade is unsupported.", "====> * check_cifs", " Check if CIFS filesystem is in use. If yes, inhibit the upgrade process.", "====> * multipath_conf_check", " Checks whether the multipath configuration can be updated to RHEL-8 and", "====> * authselect_check", " Confirm suggested authselect call from AuthselectScanner.", "====> * check_bind", " Actor parsing BIND configuration and checking for known issues in it.", "====> * check_sendmail", " Check if sendmail is installed, check whether configuration update is needed, inhibit upgrade if TCP wrappers", "====> * check_postfix", " Check if postfix is installed, check whether configuration update is needed.", "====> * check_dynamic_linker_configuration", " Check for customization of dynamic linker configuration.", "====> * check_rpm_transaction_events", " Filter RPM transaction events based on installed RPM packages", "====> * check_installed_kernels", " Inhibit IPU (in-place upgrade) when installed kernels conflict with a safe upgrade.", "====> * efi_check_boot", " Adjust EFI boot entry for first reboot", "====> * satellite_upgrade_check", " Check state of Satellite system before upgrade", "====> * check_first_partition_offset", " Check whether the first partition starts at the offset >=1MiB.", "====> * check_removed_envvars", " Check for usage of removed environment variables and inhibit the upgrade", "====> * open_ssh_protocol", " Protocol configuration option was removed.", "====> * red_hat_signed_rpm_check", " Check if there are packages not signed by Red Hat in use. If yes, warn user about it.", "====> * check_ha_cluster", " Check if HA Cluster is in use. If yes, inhibit the upgrade process.", "====> * check_persistent_mounts", " Check if mounts required to be persistent are mounted in persistent fashion.", "====> * check_se_linux", " Check SELinux status and produce decision messages for further action.", "====> * check_luks_and_inhibit", " Check if any encrypted partitions is in use. If yes, inhibit the upgrade process.", "====> * check_skip_phase", " Skip all the subsequent phases until the report phase.", "==> Processing phase `Reports`", "====> * verify_check_results", " Check all dialogs and notify that user needs to make some choices.", "====> * verify_check_results", " Check all generated results messages and notify user about them.", "", "Debug output written to /var/log/leapp/leapp-preupgrade.log", "", "============================================================", " REPORT OVERVIEW ", "============================================================", "", "Upgrade has been inhibited due to the following problems:", " 1. Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", " 2. Use of NFS detected. Upgrade can't proceed", " 3. Use of CIFS detected. Upgrade can't proceed", "", "HIGH and MEDIUM severity reports:", " 1. Packages available in excluded repositories will not be installed", " 2. Difference in Python versions and support in RHEL 8", " 3. GRUB2 core will be automatically updated during the upgrade", " 4. Upgrade is unsupported", " 5. Module pam_pkcs11 will be removed from PAM configuration", " 6. chrony using default configuration", "", "Reports summary:", " Errors: 0", " Inhibitors: 3", " HIGH severity reports: 4", " MEDIUM severity reports: 2", " LOW severity reports: 5", " INFO severity reports: 3", "", "Before continuing, review the full report below for details about discovered problems and possible remediation instructions:", " A report has been generated at /var/log/leapp/leapp-report.txt", " A report has been generated at /var/log/leapp/leapp-report.json", "", "============================================================", " END OF REPORT OVERVIEW ", "============================================================", "", "Answerfile has been generated at /var/log/leapp/answerfile", "Job ended at 2025-12-18T16:08:49Z", ""]}, "changed": false} RUNNING HANDLER [infra.leapp.common : Rename log file] ************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:32 changed: [managed-node01] => {"changed": true, "cmd": "export PATH=$PATH\nmv /var/log/ripu/ripu.log /var/log/ripu/ripu.log-20251218T110733\n", "delta": "0:00:00.003782", "end": "2025-12-18 11:08:50.164205", "msg": "", "rc": 0, "start": "2025-12-18 11:08:50.160423", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} RUNNING HANDLER [infra.leapp.analysis : Display inhibitors] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/handlers/main.yml:32 ok: [managed-node01] => { "results_inhibitors.stdout_lines": [ "Risk Factor: high (inhibitor)", "Title: Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", "Summary: Support for the following RHEL 7 device drivers has been removed in RHEL 8:", " - pata_acpi", "", "Related links:", " - Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" : https://access.redhat.com/solutions/6971716", " - Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\": https://access.redhat.com/solutions/5436131", "Key: f08a07da902958defa4f5c2699fae9ec2eb67c5b", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Use of NFS detected. Upgrade can't proceed", "Summary: NFS is currently not supported by the inplace upgrade.", "We have found NFS usage at the following locations:", "- NFS shares found in /etc/fstab:", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat", " - nest.test.redhat.com:/mnt/qa /mnt/qa", " - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive", " - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch", "", "Related links:", " - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006", "Remediation: [hint] Disable NFS temporarily for the upgrade if possible.", "Key: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Use of CIFS detected. Upgrade can't proceed", "Summary: CIFS is currently not supported by the inplace upgrade.", "Related links:", " - Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\": https://access.redhat.com/solutions/6964304", "Remediation: [hint] Comment out CIFS entries to proceed with the upgrade.", "Key: d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "----------------------------------------" ] } RUNNING HANDLER [infra.leapp.analysis : Display errors] ************************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/handlers/main.yml:40 skipping: [managed-node01] => {} RUNNING HANDLER [infra.leapp.analysis : Preupgrade analysis report is done] **** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/handlers/main.yml:48 ok: [managed-node01] => { "msg": "The preupgrade analysis report generation is now complete. WARNING: Inhibitors found. Review the tasks above or the result file at /var/log/leapp/leapp-report.txt." } TASK [common_upgrade_tasks | Show all inhibitors collected by analysis] ******** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:28 ok: [managed-node01] => { "leapp_inhibitors": [ { "actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": { "external": [ { "title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716" }, { "title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131" } ] }, "groups": [ "kernel", "drivers", "inhibitor" ], "hostname": "managed-node01", "id": "e3f427823b8355567496978da8f6ad5846cb29138edef4920e193c0f3ae92a64", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-12-18T16:08:20.802663Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed." }, { "actor": "check_nfs", "audience": "sysadmin", "detail": { "external": [ { "title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006" } ], "related_resources": [ { "scheme": "file", "title": "/etc/fstab" } ], "remediations": [ { "context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint" } ] }, "groups": [ "filesystem", "network", "inhibitor" ], "hostname": "managed-node01", "id": "9e3e3cf2d2be70f483b7f3a5f63cfab6d2001a75cd139741f8357a5f065cf2f2", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2025-12-18T16:08:21.837113Z", "title": "Use of NFS detected. Upgrade can't proceed" }, { "actor": "check_cifs", "audience": "sysadmin", "detail": { "external": [ { "title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304" } ], "related_resources": [ { "scheme": "file", "title": "/etc/fstab" } ], "remediations": [ { "context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint" } ] }, "groups": [ "filesystem", "network", "inhibitor" ], "hostname": "managed-node01", "id": "86bf2693d7906c2175b864de82e00a3383df112c7b72028999a9f8d631129b1b", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2025-12-18T16:08:23.865954Z", "title": "Use of CIFS detected. Upgrade can't proceed" } ] } TASK [common_upgrade_tasks | Extract inhibitor titles] ************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:32 ok: [managed-node01] => {"ansible_facts": {"inhibitor_titles": ["Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", "Use of NFS detected. Upgrade can't proceed", "Use of CIFS detected. Upgrade can't proceed"]}, "changed": false} TASK [common_upgrade_tasks | Initialize remediation_todo] ********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:36 ok: [managed-node01] => {"ansible_facts": {"leapp_remediation_todo": []}, "changed": false} TASK [common_upgrade_tasks | Map inhibitors to remediation_todo] *************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:40 ok: [managed-node01] => (item=Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.) => {"ansible_facts": {"leapp_remediation_todo": ["leapp_loaded_removed_kernel_drivers"]}, "ansible_loop_var": "inhibitor_title", "changed": false, "inhibitor_title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."} ok: [managed-node01] => (item=Use of NFS detected. Upgrade can't proceed) => {"ansible_facts": {"leapp_remediation_todo": ["leapp_loaded_removed_kernel_drivers", "leapp_nfs_detected"]}, "ansible_loop_var": "inhibitor_title", "changed": false, "inhibitor_title": "Use of NFS detected. Upgrade can't proceed"} ok: [managed-node01] => (item=Use of CIFS detected. Upgrade can't proceed) => {"ansible_facts": {"leapp_remediation_todo": ["leapp_loaded_removed_kernel_drivers", "leapp_nfs_detected", "leapp_cifs_detected"]}, "ansible_loop_var": "inhibitor_title", "changed": false, "inhibitor_title": "Use of CIFS detected. Upgrade can't proceed"} TASK [common_upgrade_tasks | Debug remediation_todo] *************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:50 ok: [managed-node01] => { "leapp_remediation_todo": [ "leapp_loaded_removed_kernel_drivers", "leapp_nfs_detected", "leapp_cifs_detected" ] } TASK [common_upgrade_tasks | Run remediation] ********************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:54 TASK [infra.leapp.remediate : Check that the leapp-report.json exists] ********* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/main.yml:7 ok: [managed-node01] => {"changed": false, "stat": {"atime": 1766074128.1308126, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 48, "charset": "us-ascii", "checksum": "4c791d06042ab20f945e086cf9442fa558ee29d2", "ctime": 1766074104.961807, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 46137427, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1766074104.961807, "nlink": 1, "path": "/var/log/leapp/leapp-report.json", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 22829, "uid": 0, "version": "18446744072816314912", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} TASK [infra.leapp.remediate : Set leapp_report_missing to true if the leapp-report.json does not exist] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/main.yml:12 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.remediate : Read leapp report] ******************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/main.yml:17 ok: [managed-node01] => {"changed": false, "content": "{
  "leapp_run_id": "ed44ff34-02f9-42be-a31a-d4bb7458cd15", 
  "entries": [
    {
      "groups": [
        "repository", 
        "failure"
      ], 
      "title": "Excluded target system repositories", 
      "timeStamp": "2025-12-18T16:08:17.398541Z", 
      "hostname": "managed-node01", 
      "detail": {
        "remediations": [
          {
            "type": "hint", 
            "context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times)."
          }
        ]
      }, 
      "actor": "repositories_blacklist", 
      "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms", 
      "audience": "sysadmin", 
      "key": "1b9132cb2362ae7830e48eee7811be9527747de8", 
      "id": "eb00dfd4b19561998061dd8d4554f258d0a68aa79e3e950614bf450671747149", 
      "severity": "info"
    }, 
    {
      "groups": [
        "repository"
      ], 
      "title": "Packages available in excluded repositories will not be installed", 
      "timeStamp": "2025-12-18T16:08:19.997376Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "python3-pyxattr"
          }, 
          {
            "scheme": "package", 
            "title": "rpcgen"
          }
        ]
      }, 
      "actor": "pes_events_scanner", 
      "summary": "2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", 
      "audience": "sysadmin", 
      "key": "2437e204808f987477c0e9be8e4c95b3a87a9f3e", 
      "id": "fb5b080da49e736824977b0ffdc835d6af685ac8d0afd5a16c9335d934af387f", 
      "severity": "high"
    }, 
    {
      "groups": [
        "tools"
      ], 
      "title": "Grep has incompatible changes in the next major version", 
      "timeStamp": "2025-12-18T16:08:20.252640Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "grep"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Please update your scripts to be compatible with the changes."
          }
        ]
      }, 
      "actor": "checkgrep", 
      "summary": "If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.\nThe 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.\nIn locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.\nWhen searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.\nThe 'grep -z' no longer automatically treats the byte '\\200' as binary data.\nContext no longer excludes selected lines omitted because of -m. For example, 'grep \"^\" -m1 -A1' now outputs the first two input lines, not just the first line.\n", 
      "audience": "sysadmin", 
      "key": "94665a499e2eeee35eca3e7093a7abe183384b16", 
      "id": "de7b5e22f23344bc4d72b9b0caac92cda15a094c68952b1ee3d75c4d4ade0dfe", 
      "severity": "low"
    }, 
    {
      "groups": [
        "python"
      ], 
      "title": "Difference in Python versions and support in RHEL 8", 
      "timeStamp": "2025-12-18T16:08:20.292089Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "python"
          }, 
          {
            "scheme": "package", 
            "title": "python2"
          }, 
          {
            "scheme": "package", 
            "title": "python3"
          }
        ], 
        "external": [
          {
            "url": "https://red.ht/rhel-8-python", 
            "title": "Difference in Python versions and support in RHEL 8"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Please run \"alternatives --set python /usr/bin/python3\" after upgrade"
          }
        ]
      }, 
      "actor": "python_inform_user", 
      "summary": "In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", 
      "audience": "developer", 
      "key": "0c98585b1d8d252eb540bf61560094f3495351f5", 
      "id": "bcf11fdb264a0688181b1aa36c1f3d11c06021a6ef0a3e2a5c824722650840f6", 
      "severity": "high"
    }, 
    {
      "groups": [
        "kernel", 
        "drivers", 
        "inhibitor"
      ], 
      "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", 
      "timeStamp": "2025-12-18T16:08:20.802663Z", 
      "hostname": "managed-node01", 
      "detail": {
        "external": [
          {
            "url": "https://access.redhat.com/solutions/6971716", 
            "title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" "
          }, 
          {
            "url": "https://access.redhat.com/solutions/5436131", 
            "title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\""
          }
        ]
      }, 
      "actor": "check_detected_devices_and_drivers", 
      "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n     - pata_acpi\n", 
      "audience": "sysadmin", 
      "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", 
      "id": "e3f427823b8355567496978da8f6ad5846cb29138edef4920e193c0f3ae92a64", 
      "severity": "high"
    }, 
    {
      "groups": [
        "filesystem"
      ], 
      "title": "Detected broken systemd symlinks for non-existing services", 
      "timeStamp": "2025-12-18T16:08:21.029599Z", 
      "hostname": "managed-node01", 
      "detail": {
        "remediations": [
          {
            "type": "hint", 
            "context": "Remove the invalid symlinks before the upgrade."
          }, 
          {
            "type": "command", 
            "context": [
              "/usr/bin/rm", 
              "/etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service"
            ]
          }
        ]
      }, 
      "actor": "check_systemd_broken_symlinks", 
      "summary": "Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:\n    - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", 
      "audience": "sysadmin", 
      "key": "be2083fee03f5f0a708fd193d82d2fe20aee7217", 
      "id": "dd082b42d5de8e94951d316696bc75fbd6093982ee2d8935d940146bb286560a", 
      "severity": "low"
    }, 
    {
      "groups": [
        "repository"
      ], 
      "title": "Some enabled RPM repositories are unknown to Leapp", 
      "timeStamp": "2025-12-18T16:08:21.264596Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "libsolv"
          }, 
          {
            "scheme": "package", 
            "title": "python-perf"
          }, 
          {
            "scheme": "package", 
            "title": "kernel-tools-libs"
          }, 
          {
            "scheme": "package", 
            "title": "libreport-filesystem"
          }, 
          {
            "scheme": "package", 
            "title": "json-glib"
          }, 
          {
            "scheme": "package", 
            "title": "librepo"
          }, 
          {
            "scheme": "package", 
            "title": "kernel-tools"
          }, 
          {
            "scheme": "repository", 
            "title": "rhel"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket"
          }
        ]
      }, 
      "actor": "check_skipped_repositories", 
      "summary": "The following repositories with Red Hat-signed packages are unknown to Leapp:\n- rhel\nAnd the following packages installed from those repositories may not be upgraded:\n- libsolv\n- python-perf\n- kernel-tools-libs\n- libreport-filesystem\n- json-glib\n- librepo\n- kernel-tools", 
      "audience": "sysadmin", 
      "key": "8e89e20c645cea600b240156071d81c64daab7ad", 
      "id": "9e123c8d868e5d97f94972017035575313929da5b2d0b2619b5ccc5c1eedc63a", 
      "severity": "low"
    }, 
    {
      "groups": [
        "boot"
      ], 
      "title": "GRUB2 core will be automatically updated during the upgrade", 
      "timeStamp": "2025-12-18T16:08:21.477826Z", 
      "hostname": "managed-node01", 
      "actor": "check_grub_core", 
      "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", 
      "audience": "sysadmin", 
      "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", 
      "id": "085356ec0993c463eb136e1b9c1e791825b4c82656814cbf1cc04fc6354d7772", 
      "severity": "high"
    }, 
    {
      "groups": [
        "filesystem", 
        "network", 
        "inhibitor"
      ], 
      "title": "Use of NFS detected. Upgrade can't proceed", 
      "timeStamp": "2025-12-18T16:08:21.837113Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "file", 
            "title": "/etc/fstab"
          }
        ], 
        "external": [
          {
            "url": "https://access.redhat.com/solutions/6964006", 
            "title": "Why does leapp upgrade fail on detecting NFS during upgrade?"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Disable NFS temporarily for the upgrade if possible."
          }
        ]
      }, 
      "actor": "check_nfs", 
      "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", 
      "audience": "sysadmin", 
      "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", 
      "id": "9e3e3cf2d2be70f483b7f3a5f63cfab6d2001a75cd139741f8357a5f065cf2f2", 
      "severity": "high"
    }, 
    {
      "groups": [
        "authentication", 
        "security", 
        "tools"
      ], 
      "title": "Module pam_pkcs11 will be removed from PAM configuration", 
      "timeStamp": "2025-12-18T16:08:22.261862Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "sssd"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Configure SSSD to replace pam_pkcs11"
          }
        ]
      }, 
      "actor": "removed_pam_modules_check", 
      "summary": "Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.", 
      "audience": "sysadmin", 
      "key": "bf47e7305d6805e8bbeaa7593cf01e38030c23f3", 
      "id": "737879c8399731e7817d8733ddc81274f6bbfff74b172c0f4e3970a403586490", 
      "severity": "medium"
    }, 
    {
      "groups": [
        "services", 
        "time management"
      ], 
      "title": "chrony using default configuration", 
      "timeStamp": "2025-12-18T16:08:23.486703Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "ntpd"
          }, 
          {
            "scheme": "package", 
            "title": "chrony"
          }, 
          {
            "scheme": "file", 
            "title": "/etc/chrony.conf"
          }
        ]
      }, 
      "actor": "check_chrony", 
      "summary": "default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives", 
      "audience": "sysadmin", 
      "key": "c4222ebd18730a76f6bc7b3b66df898b106e6554", 
      "id": "946f87754df9dae8dfff2e91cd4b80dc01379843fbeb16a275400ad49d66feaa", 
      "severity": "medium"
    }, 
    {
      "groups": [
        "upgrade process", 
        "sanity"
      ], 
      "title": "Upgrade is unsupported", 
      "timeStamp": "2025-12-18T16:08:23.822646Z", 
      "hostname": "managed-node01", 
      "actor": "unsupported_upgrade_check", 
      "summary": "Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.\n", 
      "audience": "sysadmin", 
      "key": "9e5088e3c1f371e020ec777c3d86578f4be143cf", 
      "id": "b8bddc307355cc09c7386a52943527de8eb95ae904b3b116cfcbbc22ac2c6369", 
      "severity": "high"
    }, 
    {
      "groups": [
        "filesystem", 
        "network", 
        "inhibitor"
      ], 
      "title": "Use of CIFS detected. Upgrade can't proceed", 
      "timeStamp": "2025-12-18T16:08:23.865954Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "file", 
            "title": "/etc/fstab"
          }
        ], 
        "external": [
          {
            "url": "https://access.redhat.com/solutions/6964304", 
            "title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\""
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Comment out CIFS entries to proceed with the upgrade."
          }
        ]
      }, 
      "actor": "check_cifs", 
      "summary": "CIFS is currently not supported by the inplace upgrade.", 
      "audience": "sysadmin", 
      "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", 
      "id": "86bf2693d7906c2175b864de82e00a3383df112c7b72028999a9f8d631129b1b", 
      "severity": "high"
    }, 
    {
      "groups": [
        "authentication", 
        "security", 
        "tools"
      ], 
      "title": "Current PAM and nsswitch.conf configuration will be kept.", 
      "timeStamp": "2025-12-18T16:08:23.944032Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "authselect"
          }, 
          {
            "scheme": "package", 
            "title": "authconfig"
          }, 
          {
            "scheme": "file", 
            "title": "/etc/nsswitch.conf"
          }
        ]
      }, 
      "actor": "authselect_check", 
      "summary": "There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.", 
      "audience": "sysadmin", 
      "key": "40c4ab1da4a30dc1ca40e543f6385e1336d8810c", 
      "id": "81cca5a856b1c2cc54831e57d83d30a56336a28c3f3c752337d2b3e20135ad7a", 
      "severity": "info"
    }, 
    {
      "groups": [
        "services", 
        "email"
      ], 
      "title": "Postfix has incompatible changes in the next major version", 
      "timeStamp": "2025-12-18T16:08:24.175162Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "postfix"
          }
        ]
      }, 
      "actor": "check_postfix", 
      "summary": "Postfix 3.x has so called \"compatibility safety net\" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.\nThe backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.\nIt can be turned on by running:  \"postconf -e compatibility_level=0\nIt can be turned off by running: \"postconf -e compatibility_level=2\n\nIn the Postfix MySQL database client, the default \"option_group\" value has changed to \"client\", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set \"option_group\" to the empty string.\n\nThe postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.\n\nPostfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to \"auto\", and introduces a new parameter \"tls_eecdh_auto_curves\" with the names of curves that may be negotiated.\n\nThe \"master.cf\" chroot default value has changed from \"y\" (yes) to \"n\" (no). This applies to master.cf services where chroot field is not explicitly specified.\n\nThe \"append_dot_mydomain\" default value has changed from \"yes\" to \"no\". You may need changing it to \"yes\" if senders cannot use complete domain names in e-mail addresses.\n\nThe \"relay_domains\" default value has changed from \"$mydestination\" to the empty value. This could result in unexpected \"Relay access denied\" errors or ETRN errors, because now will postfix by default relay only for the localhost.\n\nThe \"mynetworks_style\" default value has changed from \"subnet\" to \"host\". This parameter is used to implement the \"permit_mynetworks\" feature. The change could result in unexpected \"access denied\" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.\n\nPostfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.\n", 
      "audience": "sysadmin", 
      "key": "5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33", 
      "id": "56740ca449faa524697fda034bd04291fc2ece4ad98718f8b11cdd41ba13587a", 
      "severity": "low"
    }, 
    {
      "groups": [
        "selinux", 
        "security"
      ], 
      "title": "SElinux relabeling will be scheduled", 
      "timeStamp": "2025-12-18T16:08:24.752879Z", 
      "hostname": "managed-node01", 
      "actor": "check_se_linux", 
      "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", 
      "audience": "sysadmin", 
      "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", 
      "id": "884fb6f6fa9617d1f65b5d6a06557163ae3f8bc93bdb9f69e989e6619f08c08d", 
      "severity": "info"
    }, 
    {
      "groups": [
        "selinux", 
        "security"
      ], 
      "title": "SElinux will be set to permissive mode", 
      "timeStamp": "2025-12-18T16:08:24.756673Z", 
      "hostname": "managed-node01", 
      "detail": {
        "remediations": [
          {
            "type": "hint", 
            "context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings."
          }
        ]
      }, 
      "actor": "check_se_linux", 
      "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", 
      "audience": "sysadmin", 
      "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", 
      "id": "b9f5aa541073971ca2bf084cbd44886ce9f0a9615d159296036541aba83deffb", 
      "severity": "low"
    }
  ]
}
", "encoding": "base64", "source": "/var/log/leapp/leapp-report.json"} TASK [infra.leapp.remediate : Parse leapp report] ****************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/main.yml:23 ok: [managed-node01] => {"ansible_facts": {"leapp_report_data": {"entries": [{"actor": "repositories_blacklist", "audience": "sysadmin", "detail": {"remediations": [{"context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "type": "hint"}]}, "groups": ["repository", "failure"], "hostname": "managed-node01", "id": "eb00dfd4b19561998061dd8d4554f258d0a68aa79e3e950614bf450671747149", "key": "1b9132cb2362ae7830e48eee7811be9527747de8", "severity": "info", "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms", "timeStamp": "2025-12-18T16:08:17.398541Z", "title": "Excluded target system repositories"}, {"actor": "pes_events_scanner", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "python3-pyxattr"}, {"scheme": "package", "title": "rpcgen"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "fb5b080da49e736824977b0ffdc835d6af685ac8d0afd5a16c9335d934af387f", "key": "2437e204808f987477c0e9be8e4c95b3a87a9f3e", "severity": "high", "summary": "2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", "timeStamp": "2025-12-18T16:08:19.997376Z", "title": "Packages available in excluded repositories will not be installed"}, {"actor": "checkgrep", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "grep"}], "remediations": [{"context": "Please update your scripts to be compatible with the changes.", "type": "hint"}]}, "groups": ["tools"], "hostname": "managed-node01", "id": "de7b5e22f23344bc4d72b9b0caac92cda15a094c68952b1ee3d75c4d4ade0dfe", "key": "94665a499e2eeee35eca3e7093a7abe183384b16", "severity": "low", "summary": "If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.\nThe 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.\nIn locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.\nWhen searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.\nThe 'grep -z' no longer automatically treats the byte '\\200' as binary data.\nContext no longer excludes selected lines omitted because of -m. For example, 'grep \"^\" -m1 -A1' now outputs the first two input lines, not just the first line.\n", "timeStamp": "2025-12-18T16:08:20.252640Z", "title": "Grep has incompatible changes in the next major version"}, {"actor": "python_inform_user", "audience": "developer", "detail": {"external": [{"title": "Difference in Python versions and support in RHEL 8", "url": "https://red.ht/rhel-8-python"}], "related_resources": [{"scheme": "package", "title": "python"}, {"scheme": "package", "title": "python2"}, {"scheme": "package", "title": "python3"}], "remediations": [{"context": "Please run \"alternatives --set python /usr/bin/python3\" after upgrade", "type": "hint"}]}, "groups": ["python"], "hostname": "managed-node01", "id": "bcf11fdb264a0688181b1aa36c1f3d11c06021a6ef0a3e2a5c824722650840f6", "key": "0c98585b1d8d252eb540bf61560094f3495351f5", "severity": "high", "summary": "In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", "timeStamp": "2025-12-18T16:08:20.292089Z", "title": "Difference in Python versions and support in RHEL 8"}, {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "e3f427823b8355567496978da8f6ad5846cb29138edef4920e193c0f3ae92a64", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-12-18T16:08:20.802663Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}, {"actor": "check_systemd_broken_symlinks", "audience": "sysadmin", "detail": {"remediations": [{"context": "Remove the invalid symlinks before the upgrade.", "type": "hint"}, {"context": ["/usr/bin/rm", "/etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service"], "type": "command"}]}, "groups": ["filesystem"], "hostname": "managed-node01", "id": "dd082b42d5de8e94951d316696bc75fbd6093982ee2d8935d940146bb286560a", "key": "be2083fee03f5f0a708fd193d82d2fe20aee7217", "severity": "low", "summary": "Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:\n - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", "timeStamp": "2025-12-18T16:08:21.029599Z", "title": "Detected broken systemd symlinks for non-existing services"}, {"actor": "check_skipped_repositories", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "libsolv"}, {"scheme": "package", "title": "python-perf"}, {"scheme": "package", "title": "kernel-tools-libs"}, {"scheme": "package", "title": "libreport-filesystem"}, {"scheme": "package", "title": "json-glib"}, {"scheme": "package", "title": "librepo"}, {"scheme": "package", "title": "kernel-tools"}, {"scheme": "repository", "title": "rhel"}], "remediations": [{"context": "You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket", "type": "hint"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "9e123c8d868e5d97f94972017035575313929da5b2d0b2619b5ccc5c1eedc63a", "key": "8e89e20c645cea600b240156071d81c64daab7ad", "severity": "low", "summary": "The following repositories with Red Hat-signed packages are unknown to Leapp:\n- rhel\nAnd the following packages installed from those repositories may not be upgraded:\n- libsolv\n- python-perf\n- kernel-tools-libs\n- libreport-filesystem\n- json-glib\n- librepo\n- kernel-tools", "timeStamp": "2025-12-18T16:08:21.264596Z", "title": "Some enabled RPM repositories are unknown to Leapp"}, {"actor": "check_grub_core", "audience": "sysadmin", "groups": ["boot"], "hostname": "managed-node01", "id": "085356ec0993c463eb136e1b9c1e791825b4c82656814cbf1cc04fc6354d7772", "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", "severity": "high", "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", "timeStamp": "2025-12-18T16:08:21.477826Z", "title": "GRUB2 core will be automatically updated during the upgrade"}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "9e3e3cf2d2be70f483b7f3a5f63cfab6d2001a75cd139741f8357a5f065cf2f2", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2025-12-18T16:08:21.837113Z", "title": "Use of NFS detected. Upgrade can't proceed"}, {"actor": "removed_pam_modules_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "sssd"}], "remediations": [{"context": "Configure SSSD to replace pam_pkcs11", "type": "hint"}]}, "groups": ["authentication", "security", "tools"], "hostname": "managed-node01", "id": "737879c8399731e7817d8733ddc81274f6bbfff74b172c0f4e3970a403586490", "key": "bf47e7305d6805e8bbeaa7593cf01e38030c23f3", "severity": "medium", "summary": "Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.", "timeStamp": "2025-12-18T16:08:22.261862Z", "title": "Module pam_pkcs11 will be removed from PAM configuration"}, {"actor": "check_chrony", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "ntpd"}, {"scheme": "package", "title": "chrony"}, {"scheme": "file", "title": "/etc/chrony.conf"}]}, "groups": ["services", "time management"], "hostname": "managed-node01", "id": "946f87754df9dae8dfff2e91cd4b80dc01379843fbeb16a275400ad49d66feaa", "key": "c4222ebd18730a76f6bc7b3b66df898b106e6554", "severity": "medium", "summary": "default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives", "timeStamp": "2025-12-18T16:08:23.486703Z", "title": "chrony using default configuration"}, {"actor": "unsupported_upgrade_check", "audience": "sysadmin", "groups": ["upgrade process", "sanity"], "hostname": "managed-node01", "id": "b8bddc307355cc09c7386a52943527de8eb95ae904b3b116cfcbbc22ac2c6369", "key": "9e5088e3c1f371e020ec777c3d86578f4be143cf", "severity": "high", "summary": "Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.\n", "timeStamp": "2025-12-18T16:08:23.822646Z", "title": "Upgrade is unsupported"}, {"actor": "check_cifs", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "86bf2693d7906c2175b864de82e00a3383df112c7b72028999a9f8d631129b1b", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2025-12-18T16:08:23.865954Z", "title": "Use of CIFS detected. Upgrade can't proceed"}, {"actor": "authselect_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "authselect"}, {"scheme": "package", "title": "authconfig"}, {"scheme": "file", "title": "/etc/nsswitch.conf"}]}, "groups": ["authentication", "security", "tools"], "hostname": "managed-node01", "id": "81cca5a856b1c2cc54831e57d83d30a56336a28c3f3c752337d2b3e20135ad7a", "key": "40c4ab1da4a30dc1ca40e543f6385e1336d8810c", "severity": "info", "summary": "There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.", "timeStamp": "2025-12-18T16:08:23.944032Z", "title": "Current PAM and nsswitch.conf configuration will be kept."}, {"actor": "check_postfix", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "postfix"}]}, "groups": ["services", "email"], "hostname": "managed-node01", "id": "56740ca449faa524697fda034bd04291fc2ece4ad98718f8b11cdd41ba13587a", "key": "5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33", "severity": "low", "summary": "Postfix 3.x has so called \"compatibility safety net\" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.\nThe backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.\nIt can be turned on by running: \"postconf -e compatibility_level=0\nIt can be turned off by running: \"postconf -e compatibility_level=2\n\nIn the Postfix MySQL database client, the default \"option_group\" value has changed to \"client\", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set \"option_group\" to the empty string.\n\nThe postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.\n\nPostfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to \"auto\", and introduces a new parameter \"tls_eecdh_auto_curves\" with the names of curves that may be negotiated.\n\nThe \"master.cf\" chroot default value has changed from \"y\" (yes) to \"n\" (no). This applies to master.cf services where chroot field is not explicitly specified.\n\nThe \"append_dot_mydomain\" default value has changed from \"yes\" to \"no\". You may need changing it to \"yes\" if senders cannot use complete domain names in e-mail addresses.\n\nThe \"relay_domains\" default value has changed from \"$mydestination\" to the empty value. This could result in unexpected \"Relay access denied\" errors or ETRN errors, because now will postfix by default relay only for the localhost.\n\nThe \"mynetworks_style\" default value has changed from \"subnet\" to \"host\". This parameter is used to implement the \"permit_mynetworks\" feature. The change could result in unexpected \"access denied\" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.\n\nPostfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.\n", "timeStamp": "2025-12-18T16:08:24.175162Z", "title": "Postfix has incompatible changes in the next major version"}, {"actor": "check_se_linux", "audience": "sysadmin", "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "884fb6f6fa9617d1f65b5d6a06557163ae3f8bc93bdb9f69e989e6619f08c08d", "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", "severity": "info", "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", "timeStamp": "2025-12-18T16:08:24.752879Z", "title": "SElinux relabeling will be scheduled"}, {"actor": "check_se_linux", "audience": "sysadmin", "detail": {"remediations": [{"context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.", "type": "hint"}]}, "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "b9f5aa541073971ca2bf084cbd44886ce9f0a9615d159296036541aba83deffb", "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", "severity": "low", "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", "timeStamp": "2025-12-18T16:08:24.756673Z", "title": "SElinux will be set to permissive mode"}], "leapp_run_id": "ed44ff34-02f9-42be-a31a-d4bb7458cd15"}}, "changed": false} TASK [infra.leapp.remediate : Check that the 6to7 preupgrade report exists] **** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/main.yml:28 ok: [managed-node01] => {"changed": false, "stat": {"exists": false}} TASK [infra.leapp.remediate : Set leapp_report_missing_6to7 to true if the 6to7 preupgrade report does not exist] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/main.yml:33 ok: [managed-node01] => {"ansible_facts": {"leapp_report_missing_6to7": true}, "changed": false} TASK [infra.leapp.remediate : Read 6to7 preupgrade report] ********************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/main.yml:38 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.remediate : Remediate the system] **************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/main.yml:44 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_cifs_detected.yml for managed-node01 => (item=leapp_cifs_detected) included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_loaded_removed_kernel_drivers.yml for managed-node01 => (item=leapp_loaded_removed_kernel_drivers) included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_nfs_detected.yml for managed-node01 => (item=leapp_nfs_detected) TASK [infra.leapp.remediate : leapp_cifs_detected | Comment CIFS shares in /etc/fstab] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_cifs_detected.yml:4 changed: [managed-node01] => {"changed": true, "msg": "1 replacements made", "rc": 0} TASK [infra.leapp.remediate : leapp_loaded_removed_kernel_drivers | Continue when leapp report is missing] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_loaded_removed_kernel_drivers.yml:2 skipping: [managed-node01] => {} TASK [infra.leapp.remediate : leapp_loaded_removed_kernel_drivers | End execution of playbook if no entry found in leapp report] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_loaded_removed_kernel_drivers.yml:15 skipping: [managed-node01] => {} TASK [infra.leapp.remediate : leapp_loaded_removed_kernel_drivers | Print unsupported modules] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_loaded_removed_kernel_drivers.yml:23 ok: [managed-node01] => { "unsupported_modules": [ "pata_acpi" ] } TASK [leapp_loaded_removed_kernel_drivers | Unload unsupported modules] ******** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_loaded_removed_kernel_drivers.yml:27 TASK [infra.leapp.common : manage_kernel_modules | Load or unload kernel modules] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_kernel_modules.yml:5 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml for managed-node01 => (item=pata_acpi) TASK [infra.leapp.common : manage_one_kernel_module | Load or unload kernel module] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:5 changed: [managed-node01] => {"changed": true, "name": "pata_acpi", "params": "", "state": "absent"} TASK [infra.leapp.common : manage_one_kernel_module | Disable modules-load.d file entry] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:14 changed: [managed-node01] => {"changed": true, "checksum": "3944ae96175cb0f708925534f6813aa3732ec708", "dest": "/etc/modules-load.d/90-pata_acpi.conf", "gid": 0, "group": "root", "md5sum": "6ed82fc4f5dd648563c5b9b341d485e1", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:etc_t:s0", "size": 43, "src": "/root/.ansible/tmp/ansible-tmp-1766074132.6606524-9696-169623852816892/source", "state": "file", "uid": 0} TASK [infra.leapp.common : manage_one_kernel_module | Ensure modules are not loaded at boot] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:22 changed: [managed-node01] => {"changed": true, "checksum": "02868cd7b1c19659eae4d6edbac9b24f75e4ebc4", "dest": "/etc/modprobe.d/pata_acpi.conf", "gid": 0, "group": "root", "md5sum": "ea47b38a78658739034eb20562b82e32", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:modules_conf_t:s0", "size": 79, "src": "/root/.ansible/tmp/ansible-tmp-1766074133.195025-9715-190925436829942/source", "state": "file", "uid": 0} TASK [infra.leapp.common : manage_kernel_modules | Debug modprobe.d file] ****** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:30 ok: [managed-node01] => {"changed": false, "cmd": ["cat", "/etc/modprobe.d/pata_acpi.conf"], "delta": "0:00:00.003299", "end": "2025-12-18 11:08:53.932821", "msg": "", "rc": 0, "start": "2025-12-18 11:08:53.929522", "stderr": "", "stderr_lines": [], "stdout": "#\n# Ansible managed\n#\n# leapp\n\nblacklist pata_acpi\ninstall pata_acpi /bin/true", "stdout_lines": ["#", "# Ansible managed", "#", "# leapp", "", "blacklist pata_acpi", "install pata_acpi /bin/true"]} TASK [infra.leapp.common : manage_kernel_modules | Debug modules-load.d file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:34 fatal: [managed-node01]: FAILED! => {"changed": false, "cmd": ["cat", "/etc/modules-load.d/pata_acpi.conf"], "delta": "0:00:00.002818", "end": "2025-12-18 11:08:54.228169", "msg": "non-zero return code", "rc": 1, "start": "2025-12-18 11:08:54.225351", "stderr": "cat: /etc/modules-load.d/pata_acpi.conf: No such file or directory", "stderr_lines": ["cat: /etc/modules-load.d/pata_acpi.conf: No such file or directory"], "stdout": "", "stdout_lines": []} TASK [tests_upgrade_custom | Cleanup | Remove log files] *********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/tests_upgrade_custom.yml:49 changed: [managed-node01] => {"changed": true, "cmd": "set -euxo pipefail\nrm -f /var/log/leapp/leapp-upgrade.log\nrm -f /var/log/ripu/ripu.log*\n", "delta": "0:00:00.005160", "end": "2025-12-18 11:08:54.503271", "msg": "", "rc": 0, "start": "2025-12-18 11:08:54.498111", "stderr": "+ rm -f /var/log/leapp/leapp-upgrade.log\n+ rm -f /var/log/ripu/ripu.log-20251218T110733", "stderr_lines": ["+ rm -f /var/log/leapp/leapp-upgrade.log", "+ rm -f /var/log/ripu/ripu.log-20251218T110733"], "stdout": "", "stdout_lines": []} PLAY RECAP ********************************************************************* managed-node01 : ok=62 changed=14 unreachable=0 failed=1 skipped=14 rescued=0 ignored=0 -- Logs begin at Thu 2025-12-18 11:04:29 EST, end at Thu 2025-12-18 11:08:55 EST. -- Dec 18 11:07:32 managed-node01 ansible-ansible.legacy.setup[12513]: Invoked with filter=[] gather_subset=['all'] fact_path=/etc/ansible/facts.d gather_timeout=10 Dec 18 11:07:33 managed-node01 ansible-ansible.builtin.stat[12604]: Invoked with checksum_algorithm=sha1 get_checksum=True follow=False path=/var/log/leapp/leapp-upgrade.log get_md5=False get_mime=True get_attributes=True Dec 18 11:07:34 managed-node01 ansible-ansible.builtin.lineinfile[12666]: Invoked with group=None insertbefore=None unsafe_writes=False selevel=None create=False seuser=None serole=None owner=None backrefs=False search_string=None state=present firstmatch=False mode=None path=/etc/fstab insertafter=None regexp=None line=//127.0.0.1/test_remediate_cifs /mnt/cifs cifs username=test,password=test 0 0 attributes=None backup=False validate=None setype=None Dec 18 11:07:35 managed-node01 ansible-ansible.builtin.file[12728]: Invoked with src=None selevel=None force=False setype=None _original_basename=None unsafe_writes=False access_time=None seuser=None recurse=False state=directory access_time_format=%Y%m%d%H%M.%S group=root modification_time=None serole=None _diff_peek=None modification_time_format=%Y%m%d%H%M.%S path=/var/log/ripu owner=root follow=True attributes=None mode=0755 Dec 18 11:07:35 managed-node01 ansible-ansible.builtin.stat[12789]: Invoked with checksum_algorithm=sha1 get_checksum=True follow=False path=/var/log/ripu/ripu.log get_md5=False get_mime=True get_attributes=True Dec 18 11:07:36 managed-node01 ansible-ansible.legacy.stat[12850]: Invoked with checksum_algorithm=sha1 get_checksum=True path=/var/log/ripu/ripu.log follow=False get_md5=False get_mime=True get_attributes=True Dec 18 11:07:36 managed-node01 ansible-ansible.legacy.copy[12897]: Invoked with src=/root/.ansible/tmp/ansible-tmp-1766074055.8964975-8034-109346137321779/source directory_mode=None force=True attributes=None remote_src=None unsafe_writes=False dest=/var/log/ripu/ripu.log seuser=None setype=None group=root content=NOT_LOGGING_PARAMETER _original_basename=tmp_u5dhvv_ serole=None mode=0644 selevel=None owner=root follow=False validate=None checksum=73f07f723cf9c319781e150cea8a179d16d3f815 backup=False local_follow=None Dec 18 11:07:37 managed-node01 ansible-ansible.builtin.file[12958]: Invoked with src=None selevel=None force=False setype=None _original_basename=None unsafe_writes=False access_time=None seuser=None recurse=False state=directory access_time_format=%Y%m%d%H%M.%S group=root modification_time=None serole=None _diff_peek=None modification_time_format=%Y%m%d%H%M.%S path=/etc/ansible/facts.d owner=root follow=True attributes=None mode=0755 Dec 18 11:07:37 managed-node01 ansible-ansible.legacy.stat[13019]: Invoked with checksum_algorithm=sha1 get_checksum=True path=/etc/ansible/facts.d/pre_ripu.fact follow=False get_md5=False get_mime=True get_attributes=True Dec 18 11:07:37 managed-node01 ansible-ansible.legacy.copy[13067]: Invoked with src=/root/.ansible/tmp/ansible-tmp-1766074057.2041328-8155-126316726728255/source directory_mode=None force=True attributes=None remote_src=None unsafe_writes=False dest=/etc/ansible/facts.d/pre_ripu.fact seuser=None setype=None group=root content=NOT_LOGGING_PARAMETER _original_basename=tmpv7vvoynh serole=None mode=0644 selevel=None owner=root follow=False validate=None checksum=baf19d8d9304edf70199e29e3af532cb32fe77f1 backup=False local_follow=None Dec 18 11:07:38 managed-node01 ansible-ansible.legacy.command[13129]: Invoked with executable=None _uses_shell=True strip_empty_ends=True _raw_params=set -o pipefail; export PATH=$PATH; rpm -qa | grep -ve '[\.|+]el7' | grep -vE '^(gpg-pubkey|libmodulemd|katello-ca-consumer)' | sort removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Dec 18 11:07:38 managed-node01 ansible-ansible.legacy.stat[13195]: Invoked with checksum_algorithm=sha1 get_checksum=True path=/etc/ansible/facts.d/non_rhel_packages.fact follow=False get_md5=False get_mime=True get_attributes=True Dec 18 11:07:39 managed-node01 ansible-ansible.legacy.file[13227]: Invoked with force=False _original_basename=tmpzg6crnk0 owner=root follow=True group=root unsafe_writes=False serole=None state=file selevel=None setype=None dest=/etc/ansible/facts.d/non_rhel_packages.fact access_time=None access_time_format=%Y%m%d%H%M.%S modification_time=None path=/etc/ansible/facts.d/non_rhel_packages.fact src=None seuser=None recurse=False _diff_peek=None mode=0644 modification_time_format=%Y%m%d%H%M.%S attributes=None Dec 18 11:07:40 managed-node01 ansible-ansible.legacy.yum[13289]: Invoked with lock_timeout=30 update_cache=False conf_file=None exclude=[] allow_downgrade=False sslverify=True disable_gpg_check=False disable_excludes=None use_backend=auto validate_certs=True state=latest disablerepo=[] releasever=None skip_broken=False cacheonly=False autoremove=False download_dir=None installroot=/ install_weak_deps=True name=['leapp-upgrade'] download_only=False bugfix=False list=None install_repoquery=True update_only=False disable_plugin=[] enablerepo=['rhel-7-server-extras-rpms'] security=False enable_plugin=[] Dec 18 11:07:42 managed-node01 ansible-ansible.builtin.file[13381]: Invoked with src=None selevel=None force=False setype=None _original_basename=None unsafe_writes=False access_time=None seuser=None recurse=False state=directory access_time_format=%Y%m%d%H%M.%S group=root modification_time=None serole=None _diff_peek=None modification_time_format=%Y%m%d%H%M.%S path=/var/log/leapp owner=root follow=True attributes=None mode=0700 Dec 18 11:07:43 managed-node01 ansible-ansible.legacy.stat[13442]: Invoked with checksum_algorithm=sha1 get_checksum=True path=/var/log/leapp/answerfile follow=False get_md5=False get_mime=True get_attributes=True Dec 18 11:07:43 managed-node01 ansible-ansible.legacy.copy[13490]: Invoked with src=/root/.ansible/tmp/ansible-tmp-1766074063.1108496-8777-80301654675678/source directory_mode=None force=True attributes=None remote_src=None unsafe_writes=False dest=/var/log/leapp/answerfile seuser=None setype=None group=root content=NOT_LOGGING_PARAMETER _original_basename=tmpftrosg53 serole=None mode=0644 selevel=None owner=root follow=False validate=None checksum=3d934ad808576e3a7fb4c14a89645a4ad55ccf53 backup=False local_follow=None Dec 18 11:07:44 managed-node01 ansible-ansible.builtin.file[13552]: Invoked with src=None selevel=None force=False setype=None _original_basename=None unsafe_writes=False access_time=None seuser=None recurse=False state=absent access_time_format=%Y%m%d%H%M.%S group=None modification_time=None serole=None _diff_peek=None modification_time_format=%Y%m%d%H%M.%S path=/etc/leapp/files/leapp_upgrade_repositories.repo owner=None follow=True attributes=None mode=None Dec 18 11:07:44 managed-node01 ansible-ansible.builtin.yum_repository[13613]: Invoked with metalink=None ip_resolve=None enabled=True proxy_password=NOT_LOGGING_PARAMETER mode=0644 mirrorlist_expire=None bandwidth=None cost=None file=/etc/leapp/files/leapp_upgrade_repositories owner=root exclude=None keepalive=None repo_gpgcheck=None group=root failovermethod=None unsafe_writes=False deltarpm_metadata_percentage=None gpgkey=None setype=None http_caching=None priority=None state=present mirrorlist=None params=None gpgcheck=False include=None sslcacert=None username=None metadata_expire=None description=BaseOS for x86_64 retries=None selevel=None sslclientcert=None gpgcakey=None baseurl=['http://download.devel.redhat.com/rhel-8/nightly/updates/RHEL-8/latest-RHEL-8.10/compose/BaseOS/x86_64/os/'] s3_enabled=None ssl_check_cert_permissions=None includepkgs=None async=None sslverify=None password=NOT_LOGGING_PARAMETER ui_repoid_vars=None protect=None serole=None throttle=None name=rhel-8-for-x86_64-baseos-rpms deltarpm_percentage=None sslclientkey=None seuser=None reposdir=/etc/yum.repos.d skip_if_unavailable=None module_hotfixes=None keepcache=None proxy_username=None timeout=None attributes=None metadata_expire_filter=None enablegroups=None proxy=None Dec 18 11:07:45 managed-node01 ansible-ansible.builtin.yum_repository[13674]: Invoked with metalink=None ip_resolve=None enabled=True proxy_password=NOT_LOGGING_PARAMETER mode=0644 mirrorlist_expire=None bandwidth=None cost=None file=/etc/leapp/files/leapp_upgrade_repositories owner=root exclude=None keepalive=None repo_gpgcheck=None group=root failovermethod=None unsafe_writes=False deltarpm_metadata_percentage=None gpgkey=None setype=None http_caching=None priority=None state=present mirrorlist=None params=None gpgcheck=False include=None sslcacert=None username=None metadata_expire=None description=AppStream for x86_64 retries=None selevel=None sslclientcert=None gpgcakey=None baseurl=['http://download.devel.redhat.com/rhel-8/nightly/updates/RHEL-8/latest-RHEL-8.10/compose/AppStream/x86_64/os/'] s3_enabled=None ssl_check_cert_permissions=None includepkgs=None async=None sslverify=None password=NOT_LOGGING_PARAMETER ui_repoid_vars=None protect=None serole=None throttle=None name=rhel-8-for-x86_64-appstream-rpms deltarpm_percentage=None sslclientkey=None seuser=None reposdir=/etc/yum.repos.d skip_if_unavailable=None module_hotfixes=None keepcache=None proxy_username=None timeout=None attributes=None metadata_expire_filter=None enablegroups=None proxy=None Dec 18 11:07:45 managed-node01 ansible-async_wrapper.py[13743]: Invoked with j828212174650 7200 /root/.ansible/tmp/ansible-tmp-1766074065.3964188-9036-262036680218921/AnsiballZ_command.py _ Dec 18 11:07:45 managed-node01 ansible-async_wrapper.py[13746]: Starting module and watcher Dec 18 11:07:45 managed-node01 ansible-async_wrapper.py[13746]: Start watching 13747 (7200) Dec 18 11:07:45 managed-node01 ansible-async_wrapper.py[13747]: Start module (13747) Dec 18 11:07:45 managed-node01 ansible-async_wrapper.py[13743]: Return async_wrapper task started. Dec 18 11:07:46 managed-node01 ansible-ansible.legacy.command[13748]: Invoked with executable=/bin/bash _uses_shell=True strip_empty_ends=True _raw_params=set -o pipefail; export PATH=$PATH; ulimit -n 16384; leapp preupgrade --report-schema=1.2.0 --no-rhsm 2>&1 | tee -a /var/log/ripu/ripu.log removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Dec 18 11:07:50 managed-node01 ansible-async_wrapper.py[13746]: 13747 still running (7200) Dec 18 11:07:55 managed-node01 ansible-async_wrapper.py[13746]: 13747 still running (7195) Dec 18 11:08:00 managed-node01 ansible-async_wrapper.py[13746]: 13747 still running (7190) Dec 18 11:08:05 managed-node01 ansible-async_wrapper.py[13746]: 13747 still running (7185) Dec 18 11:08:10 managed-node01 ansible-async_wrapper.py[13746]: 13747 still running (7180) Dec 18 11:08:15 managed-node01 ansible-async_wrapper.py[13746]: 13747 still running (7175) Dec 18 11:08:20 managed-node01 ansible-async_wrapper.py[13746]: 13747 still running (7170) Dec 18 11:08:25 managed-node01 ansible-async_wrapper.py[13747]: Module complete (13747) Dec 18 11:08:25 managed-node01 ansible-async_wrapper.py[13746]: Done in kid B. Dec 18 11:08:45 managed-node01 sshd[11946]: Received disconnect from 10.31.46.233 port 54990:11: disconnected by user Dec 18 11:08:45 managed-node01 sshd[11946]: Disconnected from 10.31.46.233 port 54990 Dec 18 11:08:45 managed-node01 sshd[11946]: pam_unix(sshd:session): session closed for user root Dec 18 11:08:45 managed-node01 systemd-logind[528]: Removed session 2. -- Subject: Session 2 has been terminated -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- Documentation: http://www.freedesktop.org/wiki/Software/systemd/multiseat -- -- A session with the ID 2 has been terminated. Dec 18 11:08:45 managed-node01 systemd[1]: Removed slice User Slice of root. -- Subject: Unit user-0.slice has finished shutting down -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- -- Unit user-0.slice has finished shutting down. Dec 18 11:08:46 managed-node01 sshd[21890]: Accepted publickey for root from 10.31.46.233 port 33870 ssh2: ECDSA SHA256:c+O2JirnNFuXJZ0EzDta6mfkHM2+j2w5KnE3IlnJ6A0 Dec 18 11:08:46 managed-node01 systemd[1]: Created slice User Slice of root. -- Subject: Unit user-0.slice has finished start-up -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- -- Unit user-0.slice has finished starting up. -- -- The start-up result is done. Dec 18 11:08:46 managed-node01 systemd-logind[528]: New session 4 of user root. -- Subject: A new session 4 has been created for user root -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- Documentation: http://www.freedesktop.org/wiki/Software/systemd/multiseat -- -- A new session with the ID 4 has been created for the user root. -- -- The leading process of the session is 21890. Dec 18 11:08:46 managed-node01 systemd[1]: Started Session 4 of user root. -- Subject: Unit session-4.scope has finished start-up -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- -- Unit session-4.scope has finished starting up. -- -- The start-up result is done. Dec 18 11:08:46 managed-node01 sshd[21890]: pam_unix(sshd:session): session opened for user root by (uid=0) Dec 18 11:08:46 managed-node01 ansible-ansible.legacy.async_status[21951]: Invoked with jid=j828212174650.13743 mode=status _async_dir=/root/.ansible_async Dec 18 11:08:46 managed-node01 ansible-ansible.legacy.async_status[21990]: Invoked with jid=j828212174650.13743 mode=cleanup _async_dir=/root/.ansible_async Dec 18 11:08:47 managed-node01 ansible-ansible.builtin.stat[22051]: Invoked with checksum_algorithm=sha1 get_checksum=True follow=False path=/var/log/leapp/leapp-report.txt get_md5=False get_mime=True get_attributes=True Dec 18 11:08:47 managed-node01 ansible-ansible.builtin.slurp[22114]: Invoked with src=/var/log/leapp/leapp-report.txt Dec 18 11:08:48 managed-node01 ansible-ansible.builtin.slurp[22176]: Invoked with src=/var/log/leapp/leapp-report.json Dec 18 11:08:48 managed-node01 ansible-ansible.legacy.command[22237]: Invoked with executable=None _uses_shell=False strip_empty_ends=True _raw_params=awk '/\(inhibitor\)/,/^-------/' /var/log/leapp/leapp-report.txt removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Dec 18 11:08:48 managed-node01 ansible-ansible.legacy.command[22299]: Invoked with executable=None _uses_shell=False strip_empty_ends=True _raw_params=awk '/high \(error\)/,/^-------/' /var/log/leapp/leapp-report.txt removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Dec 18 11:08:49 managed-node01 ansible-ansible.builtin.stat[22362]: Invoked with checksum_algorithm=sha1 get_checksum=True follow=False path=/var/log/ripu/ripu.log get_md5=False get_mime=True get_attributes=True Dec 18 11:08:49 managed-node01 ansible-ansible.builtin.lineinfile[22425]: Invoked with group=root insertbefore=None unsafe_writes=False selevel=None create=False seuser=None serole=None backrefs=False search_string=None state=present firstmatch=False mode=0644 insertafter=None path=/var/log/ripu/ripu.log owner=root regexp=None line=Job ended at 2025-12-18T16:08:49Z attributes=None backup=False validate=None setype=None Dec 18 11:08:49 managed-node01 ansible-ansible.builtin.slurp[22486]: Invoked with src=/var/log/ripu/ripu.log Dec 18 11:08:50 managed-node01 ansible-ansible.legacy.command[22547]: Invoked with executable=None _uses_shell=True strip_empty_ends=True _raw_params=export PATH=$PATH mv /var/log/ripu/ripu.log /var/log/ripu/ripu.log-20251218T110733 removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Dec 18 11:08:50 managed-node01 ansible-ansible.builtin.stat[22610]: Invoked with checksum_algorithm=sha1 get_checksum=True follow=False path=/var/log/leapp/leapp-report.json get_md5=False get_mime=True get_attributes=True Dec 18 11:08:51 managed-node01 ansible-ansible.builtin.slurp[22673]: Invoked with src=/var/log/leapp/leapp-report.json Dec 18 11:08:51 managed-node01 ansible-ansible.builtin.stat[22734]: Invoked with checksum_algorithm=sha1 get_checksum=True follow=False path=/root/preupgrade/result.txt get_md5=False get_mime=True get_attributes=True Dec 18 11:08:51 managed-node01 ansible-ansible.builtin.replace[22796]: Invoked with seuser=None group=None encoding=utf-8 unsafe_writes=False selevel=None after=None setype=None replace=# \1cifs\2 serole=None mode=None regexp=(.*)cifs(.*) owner=None path=/etc/fstab validate=None attributes=None backup=False before=None Dec 18 11:08:52 managed-node01 ansible-community.general.modprobe[22857]: Invoked with state=absent params= name=pata_acpi persistent=disabled Dec 18 11:08:52 managed-node01 ansible-ansible.legacy.stat[22923]: Invoked with checksum_algorithm=sha1 get_checksum=True path=/etc/modules-load.d/90-pata_acpi.conf follow=False get_md5=False get_mime=True get_attributes=True Dec 18 11:08:53 managed-node01 ansible-ansible.legacy.copy[22970]: Invoked with src=/root/.ansible/tmp/ansible-tmp-1766074132.6606524-9696-169623852816892/source directory_mode=None force=True attributes=None remote_src=None unsafe_writes=False dest=/etc/modules-load.d/90-pata_acpi.conf seuser=None setype=None group=root content=NOT_LOGGING_PARAMETER _original_basename=modules-load.d.j2 serole=None mode=0644 selevel=None owner=root follow=False validate=None checksum=3944ae96175cb0f708925534f6813aa3732ec708 backup=False local_follow=None Dec 18 11:08:53 managed-node01 ansible-ansible.legacy.stat[23031]: Invoked with checksum_algorithm=sha1 get_checksum=True path=/etc/modprobe.d/pata_acpi.conf follow=False get_md5=False get_mime=True get_attributes=True Dec 18 11:08:53 managed-node01 ansible-ansible.legacy.copy[23077]: Invoked with src=/root/.ansible/tmp/ansible-tmp-1766074133.195025-9715-190925436829942/source directory_mode=None force=True attributes=None remote_src=None unsafe_writes=False dest=/etc/modprobe.d/pata_acpi.conf seuser=None setype=None group=root content=NOT_LOGGING_PARAMETER _original_basename=modprobe.d.j2 serole=None mode=0644 selevel=None owner=root follow=False validate=None checksum=02868cd7b1c19659eae4d6edbac9b24f75e4ebc4 backup=False local_follow=None Dec 18 11:08:53 managed-node01 ansible-ansible.legacy.command[23138]: Invoked with executable=None _uses_shell=False strip_empty_ends=True _raw_params=cat /etc/modprobe.d/pata_acpi.conf removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Dec 18 11:08:54 managed-node01 ansible-ansible.legacy.command[23201]: Invoked with executable=None _uses_shell=False strip_empty_ends=True _raw_params=cat /etc/modules-load.d/pata_acpi.conf removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Dec 18 11:08:54 managed-node01 ansible-ansible.legacy.command[23262]: Invoked with executable=/bin/bash _uses_shell=True strip_empty_ends=True _raw_params=set -euxo pipefail rm -f /var/log/leapp/leapp-upgrade.log rm -f /var/log/ripu/ripu.log* removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Dec 18 11:08:54 managed-node01 sshd[23275]: Accepted publickey for root from 10.31.46.233 port 39156 ssh2: RSA SHA256:9j1blwt3wcrRiGYZQ7ZGu9axm3cDklH6/z4c+Ee8CzE Dec 18 11:08:54 managed-node01 systemd-logind[528]: New session 5 of user root. -- Subject: A new session 5 has been created for user root -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- Documentation: http://www.freedesktop.org/wiki/Software/systemd/multiseat -- -- A new session with the ID 5 has been created for the user root. -- -- The leading process of the session is 23275. Dec 18 11:08:54 managed-node01 systemd[1]: Started Session 5 of user root. -- Subject: Unit session-5.scope has finished start-up -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- -- Unit session-5.scope has finished starting up. -- -- The start-up result is done. Dec 18 11:08:54 managed-node01 sshd[23275]: pam_unix(sshd:session): session opened for user root by (uid=0) Dec 18 11:08:54 managed-node01 sshd[23275]: Received disconnect from 10.31.46.233 port 39156:11: disconnected by user Dec 18 11:08:54 managed-node01 sshd[23275]: Disconnected from 10.31.46.233 port 39156 Dec 18 11:08:54 managed-node01 sshd[23275]: pam_unix(sshd:session): session closed for user root Dec 18 11:08:54 managed-node01 systemd-logind[528]: Removed session 5. -- Subject: Session 5 has been terminated -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- Documentation: http://www.freedesktop.org/wiki/Software/systemd/multiseat -- -- A session with the ID 5 has been terminated. Dec 18 11:08:55 managed-node01 sshd[23287]: Accepted publickey for root from 10.31.46.233 port 39162 ssh2: RSA SHA256:9j1blwt3wcrRiGYZQ7ZGu9axm3cDklH6/z4c+Ee8CzE Dec 18 11:08:55 managed-node01 systemd-logind[528]: New session 6 of user root. -- Subject: A new session 6 has been created for user root -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- Documentation: http://www.freedesktop.org/wiki/Software/systemd/multiseat -- -- A new session with the ID 6 has been created for the user root. -- -- The leading process of the session is 23287. Dec 18 11:08:55 managed-node01 systemd[1]: Started Session 6 of user root. -- Subject: Unit session-6.scope has finished start-up -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- -- Unit session-6.scope has finished starting up. -- -- The start-up result is done. Dec 18 11:08:55 managed-node01 sshd[23287]: pam_unix(sshd:session): session opened for user root by (uid=0)