[WARNING]: Collection infra.leapp does not support Ansible version 2.14.18 [WARNING]: running playbook inside collection infra.leapp ansible-playbook [core 2.14.18] config file = /etc/ansible/ansible.cfg configured module search path = ['/root/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] ansible python module location = /usr/lib/python3.9/site-packages/ansible ansible collection location = /root/.ansible/collections:/usr/share/ansible/collections executable location = /usr/bin/ansible-playbook python version = 3.9.25 (main, Nov 10 2025, 00:00:00) [GCC 11.5.0 20240719 (Red Hat 11.5.0-11)] (/usr/bin/python3) jinja version = 3.1.2 libyaml = True Using /etc/ansible/ansible.cfg as config file Skipping callback 'default', as we already have a stdout callback. Skipping callback 'minimal', as we already have a stdout callback. Skipping callback 'oneline', as we already have a stdout callback. PLAYBOOK: tests_remediations_7to8.yml ****************************************** 1 plays in /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_remediations_7to8.yml PLAY [Test RHEL 7 to 8 remediations] ******************************************* TASK [Gathering Facts] ********************************************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_remediations_7to8.yml:2 ok: [managed-node01] TASK [Include tests_upgrade_custom playbook] *********************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_remediations_7to8.yml:22 included: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/tests_upgrade_custom.yml for managed-node01 TASK [tests_upgrade_custom | Check if leapp upgrade log exists] **************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/tests_upgrade_custom.yml:12 ok: [managed-node01] => {"changed": false, "stat": {"exists": false}} TASK [tests_upgrade_custom | Skip test if already upgraded or not RHEL {{ rhel_base_ver }}] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/tests_upgrade_custom.yml:17 META: end_play conditional evaluated to False, continuing play skipping: [managed-node01] => {"msg": "end_play", "skip_reason": "end_play conditional evaluated to False, continuing play"} TASK [tests_upgrade_custom | Include common upgrade tasks] ********************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/tests_upgrade_custom.yml:27 included: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml for managed-node01 TASK [common_upgrade_tasks | Gather setup tasks] ******************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:4 ok: [managed-node01 -> localhost] => {"changed": false, "examined": 1, "files": [{"atime": 1766002865.598552, "ctime": 1766002865.446552, "dev": 51716, "gid": 0, "gr_name": "root", "inode": 125829260, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1766002865.446552, "nlink": 1, "path": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_cifs.yml", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 267, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}], "matched": 1, "msg": "All paths examined", "skipped_paths": {}} TASK [common_upgrade_tasks | Do setup tasks] *********************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:11 included: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_cifs.yml for managed-node01 => (item=/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_cifs.yml) TASK [setup | remediate_cifs | Add a CIFS share to /etc/fstab] ***************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_cifs.yml:3 changed: [managed-node01] => {"backup": "", "changed": true, "msg": "line added"} TASK [common_upgrade_tasks | Run first analysis] ******************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:21 [WARNING]: Collection community.general does not support Ansible version 2.14.18 TASK [infra.leapp.common : Log directory exists] ******************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:3 ok: [managed-node01] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/var/log/ripu", "secontext": "unconfined_u:object_r:var_log_t:s0", "size": 6, "state": "directory", "uid": 0} TASK [infra.leapp.common : Check for existing log file] ************************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:11 ok: [managed-node01] => {"changed": false, "stat": {"exists": false}} TASK [infra.leapp.common : Fail if log file already exists] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:16 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : Create new log file] ******************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:23 NOTIFIED HANDLER infra.leapp.common : Check for log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Add end time to log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Slurp ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Decode ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Rename log file for managed-node01 changed: [managed-node01] => {"changed": true, "checksum": "fada9d472b443b4f5d835577fd7a6650e2c26790", "dest": "/var/log/ripu/ripu.log", "gid": 0, "group": "root", "md5sum": "3713ce8290028e2d99daced75d3675aa", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:var_log_t:s0", "size": 61, "src": "/root/.ansible/tmp/ansible-tmp-1766003386.5130155-8148-202815317831898/source", "state": "file", "uid": 0} TASK [infra.leapp.common : /etc/ansible/facts.d directory exists] ************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:35 ok: [managed-node01] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc/ansible/facts.d", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 57, "state": "directory", "uid": 0} TASK [infra.leapp.common : Capture current ansible_facts for validation after upgrade] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:43 changed: [managed-node01] => {"changed": true, "checksum": "27a60a9d0bf0e849fd889d25a1a2b229cc593722", "dest": "/etc/ansible/facts.d/pre_ripu.fact", "gid": 0, "group": "root", "md5sum": "22e16195540bf081b05233a9a0ed52d3", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:etc_t:s0", "size": 12006, "src": "/root/.ansible/tmp/ansible-tmp-1766003387.613098-8199-46666967350113/source", "state": "file", "uid": 0} TASK [infra.leapp.common : Capture a list of non-rhel versioned packages] ****** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:51 ok: [managed-node01] => {"changed": false, "cmd": "set -o pipefail; export PATH=$PATH; rpm -qa | grep -ve '[\\.|+]el7' | grep -vE '^(gpg-pubkey|libmodulemd|katello-ca-consumer)' | sort", "delta": "0:00:00.346162", "end": "2025-12-17 15:29:49.134039", "failed_when_result": false, "msg": "", "rc": 0, "start": "2025-12-17 15:29:48.787877", "stderr": "", "stderr_lines": [], "stdout": "epel-release-7-14.noarch\ntps-devel-2.44.50-1.noarch", "stdout_lines": ["epel-release-7-14.noarch", "tps-devel-2.44.50-1.noarch"]} TASK [infra.leapp.common : Create fact with the non-rhel versioned packages list] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:65 ok: [managed-node01] => {"ansible_facts": {"non_rhel_packages": ["epel-release-7-14.noarch", "tps-devel-2.44.50-1.noarch"]}, "changed": false} TASK [infra.leapp.common : Capture the list of non-rhel versioned packages in a separate fact file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:69 ok: [managed-node01] => {"changed": false, "checksum": "6d36b22d9c2b2f366fc090edfbac427c77d524a5", "dest": "/etc/ansible/facts.d/non_rhel_packages.fact", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/ansible/facts.d/non_rhel_packages.fact", "secontext": "system_u:object_r:etc_t:s0", "size": 58, "state": "file", "uid": 0} TASK [infra.leapp.analysis : Include tasks for preupg assistant analysis] ****** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:9 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : Include tasks for leapp preupgrade analysis] ****** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:13 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml for managed-node01 TASK [infra.leapp.analysis : analysis-leapp | Register to leapp activation key] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:2 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [analysis-leapp | Include custom_local_repos for local_repos_pre_leapp] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:14 TASK [infra.leapp.common : custom_local_repos | Remove old /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:2 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : custom_local_repos | Enable custom upgrade yum repositories] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:9 skipping: [managed-node01] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} TASK [infra.leapp.analysis : analysis-leapp | Install packages for preupgrade analysis on RHEL 7] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:22 ok: [managed-node01] => {"changed": false, "changes": {"installed": [], "updated": []}, "msg": "", "rc": 0, "results": ["All packages providing leapp-upgrade are up to date", ""]} TASK [infra.leapp.analysis : analysis-leapp | Install packages for preupgrade analysis on RHEL 8] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:29 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : analysis-leapp | Install packages for preupgrade analysis on RHEL 9] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:36 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : analysis-leapp | Ensure leapp log directory exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:43 ok: [managed-node01] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/var/log/leapp", "secontext": "system_u:object_r:var_log_t:s0", "size": 118, "state": "directory", "uid": 0} TASK [infra.leapp.analysis : analysis-leapp | Populate leapp_answers file] ***** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:51 changed: [managed-node01] => {"changed": true, "checksum": "3d934ad808576e3a7fb4c14a89645a4ad55ccf53", "dest": "/var/log/leapp/answerfile", "gid": 0, "group": "root", "md5sum": "01e375235c8e4cafdec593b260354063", "mode": "0644", "owner": "root", "secontext": "unconfined_u:object_r:var_log_t:s0", "size": 48, "src": "/root/.ansible/tmp/ansible-tmp-1766003397.245587-9185-1899103335564/source", "state": "file", "uid": 0} TASK [analysis-leapp | Create /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:60 TASK [infra.leapp.common : custom_local_repos | Remove old /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:2 ok: [managed-node01] => {"changed": false, "path": "/etc/leapp/files/leapp_upgrade_repositories.repo", "state": "absent"} TASK [infra.leapp.common : custom_local_repos | Enable custom upgrade yum repositories] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:9 changed: [managed-node01] => (item=None) => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": true} changed: [managed-node01] => (item=None) => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": true} changed: [managed-node01] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": true} TASK [infra.leapp.analysis : analysis-leapp | Leapp preupgrade report] ********* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:71 ASYNC FAILED on managed-node01: jid=j599168551211.13829 changed: [managed-node01] => {"ansible_job_id": "j599168551211.13829", "changed": true, "cmd": "set -o pipefail; export PATH=$PATH; ulimit -n 16384; leapp preupgrade --report-schema=1.2.0 --no-rhsm 2>&1 | tee -a /var/log/ripu/ripu.log\n", "delta": "0:00:39.489864", "end": "2025-12-17 15:30:38.734827", "failed_when_result": false, "finished": 1, "msg": "non-zero return code", "rc": 1, "results_file": "/root/.ansible_async/j599168551211.13829", "start": "2025-12-17 15:29:59.244963", "started": 1, "stderr": "", "stderr_lines": [], "stdout": "\n============================================================\n UNSUPPORTED UPGRADE \n============================================================\n\nVariable LEAPP_UNSUPPORTED has been detected. Proceeding at your own risk.\nDevelopment variables have been detected:\n- LEAPP_DEVEL_RPMS_ALL_SIGNED=1\n\n============================================================\n UNSUPPORTED UPGRADE \n============================================================\n\n==> Processing phase `configuration_phase`\n====> * ipu_workflow_config\n IPU workflow config actor\n==> Processing phase `FactsCollection`\n====> * get_enabled_modules\n Provides data about which module streams are enabled on the source system.\n====> * system_facts\n Provides data about many facts from system.\n====> * source_boot_loader_scanner\n Scans the boot loader configuration on the source system.\n====> * authselect_scanner\n Detect what authselect configuration should be suggested to administrator.\n====> * udevadm_info\n Produces data exported by the \"udevadm info\" command.\n====> * repository_mapping\n Produces message containing repository mapping based on provided file.\n====> * pam_modules_scanner\n Scan the pam directory for services and modules used in them\n====> * root_scanner\n Scan the system root directory and produce a message containing\n====> * scan_kernel_cmdline\n No documentation has been provided for the scan_kernel_cmdline actor.\n====> * scan_systemd_source\n Provides info about systemd on the source system\n====> * rpm_scanner\n Provides data about installed RPM Packages.\nLoaded plugins: product-id, subscription-manager\n\nThis system is not registered with an entitlement server. You can use subscription-manager to register.\n\n====> * transaction_workarounds\n Provides additional RPM transaction tasks based on bundled RPM packages.\n====> * scan_grub_config\n Scan grub configuration files for errors.\n====> * scan_grub_device_name\n Find the name of the block devices where GRUB is located\n====> * sctp_read_status\n Determines whether or not the SCTP kernel module might be wanted.\n====> * tcp_wrappers_config_read\n Parse tcp_wrappers configuration files /etc/hosts.{allow,deny}.\n====> * scan_custom_modifications_actor\n Collects information about files in leapp directories that have been modified or newly added.\n====> * scan_files_for_target_userspace\n Scan the source system and identify files that will be copied into the target userspace when it is created.\n====> * register_yum_adjustment\n Registers a workaround which will adjust the yum directories during the upgrade.\n====> * scan_custom_repofile\n Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.\n====> * load_device_driver_deprecation_data\n Loads deprecation data for drivers and devices (PCI & CPU)\n====> * trusted_gpg_keys_scanner\n Scan for trusted GPG keys.\n====> * removed_pam_modules_scanner\n Scan PAM configuration for modules that are not available in RHEL-8.\n====> * scanzfcp\n In case of s390x architecture, check whether ZFCP is used.\n====> * scanclienablerepo\n Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.\n====> * read_openssh_config\n Collect information about the OpenSSH configuration.\n====> * common_leapp_dracut_modules\n Influences the generation of the initram disk\n====> * scan_fips\n Determine whether the source system has FIPS enabled.\n====> * storage_scanner\n Provides data about storage settings.\n====> * detect_kernel_drivers\n Matches all currently loaded kernel drivers against known deprecated and removed drivers.\n====> * sssd_facts\n Check SSSD configuration for changes in RHEL8 and report them in model.\n====> * copy_dnf_conf_into_target_userspace\n Copy dnf.conf into target userspace\n====> * firewalld_facts_actor\n Provide data about firewalld\n====> * selinuxcontentscanner\n Scan the system for any SELinux customizations\n====> * distribution_signed_rpm_scanner\n Provide data about distribution signed & unsigned RPM packages.\n====> * scan_grub_device_partition_layout\n Scan all identified GRUB devices for their partition layout.\n====> * check_grub_legacy\n Check whether GRUB Legacy is installed in the MBR.\n====> * scandasd\n In case of s390x architecture, check whether DASD is used.\n====> * scanmemory\n Scan Memory of the machine.\n====> * scan_subscription_manager_info\n Scans the current system for subscription manager information\n====> * satellite_upgrade_facts\n Report which Satellite packages require updates and how to handle PostgreSQL data\n====> * cups_scanner\n Gather facts about CUPS features which needs to be migrated\n====> * pci_devices_scanner\n Provides data about existing PCI Devices.\n====> * scan_pkg_manager\n Provides data about package manager (yum/dnf)\n====> * checkrhui\n Check if system is using RHUI infrastructure (on public cloud) and send messages to\n====> * scan_sap_hana\n Gathers information related to SAP HANA instances on the system.\n====> * network_manager_read_config\n Provides data about NetworkManager configuration.\n====> * scan_source_files\n Scan files (explicitly specified) of the source system.\n====> * scan_source_kernel\n Scan the source system kernel.\n====> * scan_target_os_image\n Scans the provided target OS ISO image to use as a content source for the IPU, if any.\n====> * remove_obsolete_gpg_keys\n Remove obsoleted RPM GPG keys.\n====> * multipath_conf_read\n Read multipath configuration files and extract the necessary information\n====> * persistentnetnames\n Get network interface information for physical ethernet interfaces of the original system.\n====> * quagga_daemons\n Active quagga daemons check.\n====> * get_installed_desktops\n Actor checks if kde or gnome desktop environments\n====> * scancpu\n Scan CPUs of the machine.\n====> * check_kde_apps\n Actor checks which KDE apps are installed.\n====> * repositories_blacklist\n Exclude target repositories provided by Red Hat without support.\n====> * biosdevname\n Enable biosdevname on the target RHEL system if all interfaces on the source RHEL\n====> * rpm_transaction_config_tasks_collector\n Provides additional RPM transaction tasks from /etc/leapp/transaction.\n====> * ipa_scanner\n Scan system for ipa-client and ipa-server status\n====> * spamassassin_config_read\n Reads spamc configuration (/etc/mail/spamassassin/spamc.conf), the\n====> * vsftpd_config_read\n Reads vsftpd configuration files (/etc/vsftpd/*.conf) and extracts necessary information.\n====> * scan_dynamic_linker_configuration\n Scan the dynamic linker configuration and find modifications.\n====> * xfs_info_scanner\n This actor scans all mounted mountpoints for XFS information\n====> * used_repository_scanner\n Scan used enabled repositories\n====> * persistentnetnamesdisable\n Disable systemd-udevd persistent network naming on machine with single eth0 NIC\n====> * pes_events_scanner\n Provides data about package events from Package Evolution Service.\n====> * setuptargetrepos\n Produces list of repositories that should be available to be used by Upgrade process.\n==> Processing phase `Checks`\n====> * open_ssh_algorithms\n OpenSSH configuration does not contain any unsupported cryptographic algorithms.\n====> * checktargetrepos\n Check whether target yum repositories are specified.\n====> * satellite_upgrade_check\n Check state of Satellite system before upgrade\n====> * checkirssi\n Check if irssi is installed. If yes, write information about non-compatible changes.\n====> * check_os_release\n Check if the current RHEL minor version is supported. If not, inhibit the upgrade process.\n====> * zipl_check_boot_entries\n Inhibits the upgrade if a problematic Zipl configuration is detected on the system.\n====> * check_btrfs\n Check if Btrfs filesystem is in use. If yes, inhibit the upgrade process.\n====> * check_boot_avail_space\n Check if at least 100Mib of available space on /boot. If not, inhibit the upgrade process.\n====> * check_wireshark\n Report a couple of changes in tshark usage\n====> * sssd_check\n Check SSSD configuration for changes in RHEL8 and report them.\n====> * check_sap_hana\n If SAP HANA has been detected, several checks are performed to ensure a successful upgrade.\n====> * check_detected_devices_and_drivers\n Checks whether or not detected devices and drivers are usable on the target system.\n====> * check_root_symlinks\n Check if the symlinks /bin and /lib are relative, not absolute.\n====> * open_ssh_deprecated_directives_check\n Check for any deprecated directives in the OpenSSH configuration.\n====> * cups_check\n Reports changes in configuration between CUPS 1.6.3 and 2.2.6\n====> * check_ipa_server\n Check for ipa-server and inhibit upgrade\n====> * check_systemd_broken_symlinks\n Check whether some systemd symlinks are broken\n====> * check_mount_options\n Check for mount options preventing the upgrade.\n====> * check_system_arch\n Check if system is running at a supported architecture. If no, inhibit the upgrade process.\n====> * spamassassin_config_check\n Reports changes in spamassassin between RHEL-7 and RHEL-8\n====> * unsupported_upgrade_check\n Checks environment variables and produces a warning report if the upgrade is unsupported.\n====> * cephvolumescan\n Retrieves the list of encrypted Ceph OSD\n====> * check_installed_devel_kernels\n Inhibit IPU (in-place upgrade) when multiple devel kernels are installed.\n====> * check_skipped_repositories\n Produces a report if any repositories enabled on the system are going to be skipped.\n====> * multiple_package_versions\n Check for problematic 32bit packages installed together with 64bit ones.\n====> * check_grub_core\n Check whether we are on legacy (BIOS) system and instruct Leapp to upgrade GRUB core\n====> * check_consumed_assets\n Check whether Leapp is using correct data assets.\n====> * powertop\n Check if PowerTOP is installed. If yes, write information about non-compatible changes.\n====> * check_yum_plugins_enabled\n Checks that the required yum plugins are enabled.\n====> * sctp_checks\n Parses collected SCTP information and take necessary actions.\n====> * bacula_check\n Actor checking for presence of Bacula installation.\n====> * quagga_report\n Checking for babeld on RHEL-7.\n====> * check_nfs\n Check if NFS filesystem is in use. If yes, inhibit the upgrade process.\n====> * check_brltty\n Check if brltty is installed, check whether configuration update is needed.\n====> * check_target_iso\n Check that the provided target ISO is a valid ISO image and is located on a persistent partition.\n====> * python_inform_user\n This actor informs the user of differences in Python version and support in RHEL 8.\n====> * check_rhsmsku\n Ensure the system is subscribed to the subscription manager\n====> * check_insights_auto_register\n Checks if system can be automatically registered into Red Hat Insights\n====> * tcp_wrappers_check\n Check the list of packages previously compiled with TCP wrappers support\n====> * check_etc_releasever\n Check releasever info and provide a guidance based on the facts\n====> * removed_pam_modules_check\n Check if it is all right to disable PAM modules that are not in RHEL-8.\n====> * check_openssl_conf\n Check whether the openssl configuration and openssl-IBMCA.\n====> * check_sendmail\n Check if sendmail is installed, check whether configuration update is needed, inhibit upgrade if TCP wrappers\n====> * open_ssh_use_privilege_separation\n UsePrivilegeSeparation configuration option was removed.\n====> * check_memcached\n Check for incompatible changes in memcached configuration.\n====> * check_fips\n Inhibit upgrade if FIPS is detected as enabled.\n====> * check_installed_debug_kernels\n Inhibit IPU (in-place upgrade) when multiple debug kernels are installed.\n====> * check_docker\n Checks if Docker is installed and warns about its deprecation in RHEL8.\n====> * check_custom_modifications_actor\n Checks CustomModifications messages and produces a report about files in leapp directories that have been\n====> * check_ntp\n Check if ntp and/or ntpdate configuration needs to be migrated.\n====> * openssh_permit_root_login\n OpenSSH no longer allows root logins with password.\n====> * multipath_conf_check\n Checks whether the multipath configuration can be updated to RHEL-8 and\n====> * checkmemory\n The actor check the size of RAM against RHEL8 minimal hardware requirements\n====> * enable_device_cio_free_service\n Enables device_cio_free.service systemd service on s390x\n====> * check_bind\n Actor parsing BIND configuration and checking for known issues in it.\n====> * check_postfix\n Check if postfix is installed, check whether configuration update is needed.\n====> * check_fstab_mount_order\n Checks order of entries in /etc/fstab based on their mount point and inhibits upgrade if overshadowing is detected.\n====> * checkhybridimage\n Check if the system is using Azure hybrid image.\n====> * check_installed_kernels\n Inhibit IPU (in-place upgrade) when installed kernels conflict with a safe upgrade.\n====> * checkfstabxfsoptions\n Check the FSTAB file for the deprecated / removed XFS mount options.\n====> * removed_pam_modules\n Check for modules that are not available in RHEL 8 anymore\n====> * check_chrony\n Check for incompatible changes in chrony configuration.\n====> * checkdosfstools\n Check if dosfstools is installed. If yes, write information about non-compatible changes.\n====> * open_ssh_protocol\n Protocol configuration option was removed.\n====> * checkacpid\n Check if acpid is installed. If yes, write information about non-compatible changes.\n====> * check_ha_cluster\n Check if HA Cluster is in use. If yes, inhibit the upgrade process.\n====> * check_cifs\n Check if CIFS filesystem is in use. If yes, inhibit the upgrade process.\n====> * authselect_check\n Confirm suggested authselect call from AuthselectScanner.\n====> * check_luks_and_inhibit\n Check if any encrypted partitions is in use. If yes, inhibit the upgrade process.\n====> * checkgrep\n Check if Grep is installed. If yes, write information about non-compatible changes.\n====> * check_dynamic_linker_configuration\n Check for customization of dynamic linker configuration.\n====> * check_rpm_transaction_events\n Filter RPM transaction events based on installed RPM packages\n====> * postgresql_check\n Actor checking for presence of PostgreSQL installation.\n====> * efi_check_boot\n Adjust EFI boot entry for first reboot\n====> * check_kde_gnome\n Checks whether KDE is installed\n====> * check_first_partition_offset\n Check whether the first partition starts at the offset >=1MiB.\n====> * check_removed_envvars\n Check for usage of removed environment variables and inhibit the upgrade\n====> * vsftpd_config_check\n Checks whether the vsftpd configuration is supported in RHEL-8. Namely checks that\n====> * red_hat_signed_rpm_check\n Check if there are packages not signed by Red Hat in use. If yes, warn user about it.\n====> * check_firewalld\n Check for certain firewalld configuration that may prevent an upgrade.\n====> * check_persistent_mounts\n Check if mounts required to be persistent are mounted in persistent fashion.\n====> * detect_grub_config_error\n Check grub configuration for various errors.\n====> * check_se_linux\n Check SELinux status and produce decision messages for further action.\n====> * check_skip_phase\n Skip all the subsequent phases until the report phase.\n==> Processing phase `Reports`\n====> * verify_check_results\n Check all dialogs and notify that user needs to make some choices.\n====> * verify_check_results\n Check all generated results messages and notify user about them.\n\nDebug output written to /var/log/leapp/leapp-preupgrade.log\n\n============================================================\n REPORT OVERVIEW \n============================================================\n\nUpgrade has been inhibited due to the following problems:\n 1. Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\n 2. Use of NFS detected. Upgrade can't proceed\n 3. Use of CIFS detected. Upgrade can't proceed\n\nHIGH and MEDIUM severity reports:\n 1. Packages available in excluded repositories will not be installed\n 2. Upgrade is unsupported\n 3. GRUB2 core will be automatically updated during the upgrade\n 4. Difference in Python versions and support in RHEL 8\n 5. Module pam_pkcs11 will be removed from PAM configuration\n 6. chrony using default configuration\n\nReports summary:\n Errors: 0\n Inhibitors: 3\n HIGH severity reports: 4\n MEDIUM severity reports: 2\n LOW severity reports: 5\n INFO severity reports: 3\n\nBefore continuing, review the full report below for details about discovered problems and possible remediation instructions:\n A report has been generated at /var/log/leapp/leapp-report.txt\n A report has been generated at /var/log/leapp/leapp-report.json\n\n============================================================\n END OF REPORT OVERVIEW \n============================================================\n\nAnswerfile has been generated at /var/log/leapp/answerfile", "stdout_lines": ["", "============================================================", " UNSUPPORTED UPGRADE ", "============================================================", "", "Variable LEAPP_UNSUPPORTED has been detected. Proceeding at your own risk.", "Development variables have been detected:", "- LEAPP_DEVEL_RPMS_ALL_SIGNED=1", "", "============================================================", " UNSUPPORTED UPGRADE ", "============================================================", "", "==> Processing phase `configuration_phase`", "====> * ipu_workflow_config", " IPU workflow config actor", "==> Processing phase `FactsCollection`", "====> * get_enabled_modules", " Provides data about which module streams are enabled on the source system.", "====> * system_facts", " Provides data about many facts from system.", "====> * source_boot_loader_scanner", " Scans the boot loader configuration on the source system.", "====> * authselect_scanner", " Detect what authselect configuration should be suggested to administrator.", "====> * udevadm_info", " Produces data exported by the \"udevadm info\" command.", "====> * repository_mapping", " Produces message containing repository mapping based on provided file.", "====> * pam_modules_scanner", " Scan the pam directory for services and modules used in them", "====> * root_scanner", " Scan the system root directory and produce a message containing", "====> * scan_kernel_cmdline", " No documentation has been provided for the scan_kernel_cmdline actor.", "====> * scan_systemd_source", " Provides info about systemd on the source system", "====> * rpm_scanner", " Provides data about installed RPM Packages.", "Loaded plugins: product-id, subscription-manager", "", "This system is not registered with an entitlement server. You can use subscription-manager to register.", "", "====> * transaction_workarounds", " Provides additional RPM transaction tasks based on bundled RPM packages.", "====> * scan_grub_config", " Scan grub configuration files for errors.", "====> * scan_grub_device_name", " Find the name of the block devices where GRUB is located", "====> * sctp_read_status", " Determines whether or not the SCTP kernel module might be wanted.", "====> * tcp_wrappers_config_read", " Parse tcp_wrappers configuration files /etc/hosts.{allow,deny}.", "====> * scan_custom_modifications_actor", " Collects information about files in leapp directories that have been modified or newly added.", "====> * scan_files_for_target_userspace", " Scan the source system and identify files that will be copied into the target userspace when it is created.", "====> * register_yum_adjustment", " Registers a workaround which will adjust the yum directories during the upgrade.", "====> * scan_custom_repofile", " Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.", "====> * load_device_driver_deprecation_data", " Loads deprecation data for drivers and devices (PCI & CPU)", "====> * trusted_gpg_keys_scanner", " Scan for trusted GPG keys.", "====> * removed_pam_modules_scanner", " Scan PAM configuration for modules that are not available in RHEL-8.", "====> * scanzfcp", " In case of s390x architecture, check whether ZFCP is used.", "====> * scanclienablerepo", " Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.", "====> * read_openssh_config", " Collect information about the OpenSSH configuration.", "====> * common_leapp_dracut_modules", " Influences the generation of the initram disk", "====> * scan_fips", " Determine whether the source system has FIPS enabled.", "====> * storage_scanner", " Provides data about storage settings.", "====> * detect_kernel_drivers", " Matches all currently loaded kernel drivers against known deprecated and removed drivers.", "====> * sssd_facts", " Check SSSD configuration for changes in RHEL8 and report them in model.", "====> * copy_dnf_conf_into_target_userspace", " Copy dnf.conf into target userspace", "====> * firewalld_facts_actor", " Provide data about firewalld", "====> * selinuxcontentscanner", " Scan the system for any SELinux customizations", "====> * distribution_signed_rpm_scanner", " Provide data about distribution signed & unsigned RPM packages.", "====> * scan_grub_device_partition_layout", " Scan all identified GRUB devices for their partition layout.", "====> * check_grub_legacy", " Check whether GRUB Legacy is installed in the MBR.", "====> * scandasd", " In case of s390x architecture, check whether DASD is used.", "====> * scanmemory", " Scan Memory of the machine.", "====> * scan_subscription_manager_info", " Scans the current system for subscription manager information", "====> * satellite_upgrade_facts", " Report which Satellite packages require updates and how to handle PostgreSQL data", "====> * cups_scanner", " Gather facts about CUPS features which needs to be migrated", "====> * pci_devices_scanner", " Provides data about existing PCI Devices.", "====> * scan_pkg_manager", " Provides data about package manager (yum/dnf)", "====> * checkrhui", " Check if system is using RHUI infrastructure (on public cloud) and send messages to", "====> * scan_sap_hana", " Gathers information related to SAP HANA instances on the system.", "====> * network_manager_read_config", " Provides data about NetworkManager configuration.", "====> * scan_source_files", " Scan files (explicitly specified) of the source system.", "====> * scan_source_kernel", " Scan the source system kernel.", "====> * scan_target_os_image", " Scans the provided target OS ISO image to use as a content source for the IPU, if any.", "====> * remove_obsolete_gpg_keys", " Remove obsoleted RPM GPG keys.", "====> * multipath_conf_read", " Read multipath configuration files and extract the necessary information", "====> * persistentnetnames", " Get network interface information for physical ethernet interfaces of the original system.", "====> * quagga_daemons", " Active quagga daemons check.", "====> * get_installed_desktops", " Actor checks if kde or gnome desktop environments", "====> * scancpu", " Scan CPUs of the machine.", "====> * check_kde_apps", " Actor checks which KDE apps are installed.", "====> * repositories_blacklist", " Exclude target repositories provided by Red Hat without support.", "====> * biosdevname", " Enable biosdevname on the target RHEL system if all interfaces on the source RHEL", "====> * rpm_transaction_config_tasks_collector", " Provides additional RPM transaction tasks from /etc/leapp/transaction.", "====> * ipa_scanner", " Scan system for ipa-client and ipa-server status", "====> * spamassassin_config_read", " Reads spamc configuration (/etc/mail/spamassassin/spamc.conf), the", "====> * vsftpd_config_read", " Reads vsftpd configuration files (/etc/vsftpd/*.conf) and extracts necessary information.", "====> * scan_dynamic_linker_configuration", " Scan the dynamic linker configuration and find modifications.", "====> * xfs_info_scanner", " This actor scans all mounted mountpoints for XFS information", "====> * used_repository_scanner", " Scan used enabled repositories", "====> * persistentnetnamesdisable", " Disable systemd-udevd persistent network naming on machine with single eth0 NIC", "====> * pes_events_scanner", " Provides data about package events from Package Evolution Service.", "====> * setuptargetrepos", " Produces list of repositories that should be available to be used by Upgrade process.", "==> Processing phase `Checks`", "====> * open_ssh_algorithms", " OpenSSH configuration does not contain any unsupported cryptographic algorithms.", "====> * checktargetrepos", " Check whether target yum repositories are specified.", "====> * satellite_upgrade_check", " Check state of Satellite system before upgrade", "====> * checkirssi", " Check if irssi is installed. If yes, write information about non-compatible changes.", "====> * check_os_release", " Check if the current RHEL minor version is supported. If not, inhibit the upgrade process.", "====> * zipl_check_boot_entries", " Inhibits the upgrade if a problematic Zipl configuration is detected on the system.", "====> * check_btrfs", " Check if Btrfs filesystem is in use. If yes, inhibit the upgrade process.", "====> * check_boot_avail_space", " Check if at least 100Mib of available space on /boot. If not, inhibit the upgrade process.", "====> * check_wireshark", " Report a couple of changes in tshark usage", "====> * sssd_check", " Check SSSD configuration for changes in RHEL8 and report them.", "====> * check_sap_hana", " If SAP HANA has been detected, several checks are performed to ensure a successful upgrade.", "====> * check_detected_devices_and_drivers", " Checks whether or not detected devices and drivers are usable on the target system.", "====> * check_root_symlinks", " Check if the symlinks /bin and /lib are relative, not absolute.", "====> * open_ssh_deprecated_directives_check", " Check for any deprecated directives in the OpenSSH configuration.", "====> * cups_check", " Reports changes in configuration between CUPS 1.6.3 and 2.2.6", "====> * check_ipa_server", " Check for ipa-server and inhibit upgrade", "====> * check_systemd_broken_symlinks", " Check whether some systemd symlinks are broken", "====> * check_mount_options", " Check for mount options preventing the upgrade.", "====> * check_system_arch", " Check if system is running at a supported architecture. If no, inhibit the upgrade process.", "====> * spamassassin_config_check", " Reports changes in spamassassin between RHEL-7 and RHEL-8", "====> * unsupported_upgrade_check", " Checks environment variables and produces a warning report if the upgrade is unsupported.", "====> * cephvolumescan", " Retrieves the list of encrypted Ceph OSD", "====> * check_installed_devel_kernels", " Inhibit IPU (in-place upgrade) when multiple devel kernels are installed.", "====> * check_skipped_repositories", " Produces a report if any repositories enabled on the system are going to be skipped.", "====> * multiple_package_versions", " Check for problematic 32bit packages installed together with 64bit ones.", "====> * check_grub_core", " Check whether we are on legacy (BIOS) system and instruct Leapp to upgrade GRUB core", "====> * check_consumed_assets", " Check whether Leapp is using correct data assets.", "====> * powertop", " Check if PowerTOP is installed. If yes, write information about non-compatible changes.", "====> * check_yum_plugins_enabled", " Checks that the required yum plugins are enabled.", "====> * sctp_checks", " Parses collected SCTP information and take necessary actions.", "====> * bacula_check", " Actor checking for presence of Bacula installation.", "====> * quagga_report", " Checking for babeld on RHEL-7.", "====> * check_nfs", " Check if NFS filesystem is in use. If yes, inhibit the upgrade process.", "====> * check_brltty", " Check if brltty is installed, check whether configuration update is needed.", "====> * check_target_iso", " Check that the provided target ISO is a valid ISO image and is located on a persistent partition.", "====> * python_inform_user", " This actor informs the user of differences in Python version and support in RHEL 8.", "====> * check_rhsmsku", " Ensure the system is subscribed to the subscription manager", "====> * check_insights_auto_register", " Checks if system can be automatically registered into Red Hat Insights", "====> * tcp_wrappers_check", " Check the list of packages previously compiled with TCP wrappers support", "====> * check_etc_releasever", " Check releasever info and provide a guidance based on the facts", "====> * removed_pam_modules_check", " Check if it is all right to disable PAM modules that are not in RHEL-8.", "====> * check_openssl_conf", " Check whether the openssl configuration and openssl-IBMCA.", "====> * check_sendmail", " Check if sendmail is installed, check whether configuration update is needed, inhibit upgrade if TCP wrappers", "====> * open_ssh_use_privilege_separation", " UsePrivilegeSeparation configuration option was removed.", "====> * check_memcached", " Check for incompatible changes in memcached configuration.", "====> * check_fips", " Inhibit upgrade if FIPS is detected as enabled.", "====> * check_installed_debug_kernels", " Inhibit IPU (in-place upgrade) when multiple debug kernels are installed.", "====> * check_docker", " Checks if Docker is installed and warns about its deprecation in RHEL8.", "====> * check_custom_modifications_actor", " Checks CustomModifications messages and produces a report about files in leapp directories that have been", "====> * check_ntp", " Check if ntp and/or ntpdate configuration needs to be migrated.", "====> * openssh_permit_root_login", " OpenSSH no longer allows root logins with password.", "====> * multipath_conf_check", " Checks whether the multipath configuration can be updated to RHEL-8 and", "====> * checkmemory", " The actor check the size of RAM against RHEL8 minimal hardware requirements", "====> * enable_device_cio_free_service", " Enables device_cio_free.service systemd service on s390x", "====> * check_bind", " Actor parsing BIND configuration and checking for known issues in it.", "====> * check_postfix", " Check if postfix is installed, check whether configuration update is needed.", "====> * check_fstab_mount_order", " Checks order of entries in /etc/fstab based on their mount point and inhibits upgrade if overshadowing is detected.", "====> * checkhybridimage", " Check if the system is using Azure hybrid image.", "====> * check_installed_kernels", " Inhibit IPU (in-place upgrade) when installed kernels conflict with a safe upgrade.", "====> * checkfstabxfsoptions", " Check the FSTAB file for the deprecated / removed XFS mount options.", "====> * removed_pam_modules", " Check for modules that are not available in RHEL 8 anymore", "====> * check_chrony", " Check for incompatible changes in chrony configuration.", "====> * checkdosfstools", " Check if dosfstools is installed. If yes, write information about non-compatible changes.", "====> * open_ssh_protocol", " Protocol configuration option was removed.", "====> * checkacpid", " Check if acpid is installed. If yes, write information about non-compatible changes.", "====> * check_ha_cluster", " Check if HA Cluster is in use. If yes, inhibit the upgrade process.", "====> * check_cifs", " Check if CIFS filesystem is in use. If yes, inhibit the upgrade process.", "====> * authselect_check", " Confirm suggested authselect call from AuthselectScanner.", "====> * check_luks_and_inhibit", " Check if any encrypted partitions is in use. If yes, inhibit the upgrade process.", "====> * checkgrep", " Check if Grep is installed. If yes, write information about non-compatible changes.", "====> * check_dynamic_linker_configuration", " Check for customization of dynamic linker configuration.", "====> * check_rpm_transaction_events", " Filter RPM transaction events based on installed RPM packages", "====> * postgresql_check", " Actor checking for presence of PostgreSQL installation.", "====> * efi_check_boot", " Adjust EFI boot entry for first reboot", "====> * check_kde_gnome", " Checks whether KDE is installed", "====> * check_first_partition_offset", " Check whether the first partition starts at the offset >=1MiB.", "====> * check_removed_envvars", " Check for usage of removed environment variables and inhibit the upgrade", "====> * vsftpd_config_check", " Checks whether the vsftpd configuration is supported in RHEL-8. Namely checks that", "====> * red_hat_signed_rpm_check", " Check if there are packages not signed by Red Hat in use. If yes, warn user about it.", "====> * check_firewalld", " Check for certain firewalld configuration that may prevent an upgrade.", "====> * check_persistent_mounts", " Check if mounts required to be persistent are mounted in persistent fashion.", "====> * detect_grub_config_error", " Check grub configuration for various errors.", "====> * check_se_linux", " Check SELinux status and produce decision messages for further action.", "====> * check_skip_phase", " Skip all the subsequent phases until the report phase.", "==> Processing phase `Reports`", "====> * verify_check_results", " Check all dialogs and notify that user needs to make some choices.", "====> * verify_check_results", " Check all generated results messages and notify user about them.", "", "Debug output written to /var/log/leapp/leapp-preupgrade.log", "", "============================================================", " REPORT OVERVIEW ", "============================================================", "", "Upgrade has been inhibited due to the following problems:", " 1. Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", " 2. Use of NFS detected. Upgrade can't proceed", " 3. Use of CIFS detected. Upgrade can't proceed", "", "HIGH and MEDIUM severity reports:", " 1. Packages available in excluded repositories will not be installed", " 2. Upgrade is unsupported", " 3. GRUB2 core will be automatically updated during the upgrade", " 4. Difference in Python versions and support in RHEL 8", " 5. Module pam_pkcs11 will be removed from PAM configuration", " 6. chrony using default configuration", "", "Reports summary:", " Errors: 0", " Inhibitors: 3", " HIGH severity reports: 4", " MEDIUM severity reports: 2", " LOW severity reports: 5", " INFO severity reports: 3", "", "Before continuing, review the full report below for details about discovered problems and possible remediation instructions:", " A report has been generated at /var/log/leapp/leapp-report.txt", " A report has been generated at /var/log/leapp/leapp-report.json", "", "============================================================", " END OF REPORT OVERVIEW ", "============================================================", "", "Answerfile has been generated at /var/log/leapp/answerfile"]} TASK [analysis-leapp | Include custom_local_repos for local_repos_post_analysis] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:89 TASK [infra.leapp.common : custom_local_repos | Remove old /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:2 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : custom_local_repos | Enable custom upgrade yum repositories] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:9 skipping: [managed-node01] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} TASK [infra.leapp.analysis : analysis-leapp | Include check-results-file.yml] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:97 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/check-results-file.yml for managed-node01 TASK [infra.leapp.analysis : check-results-file | Result file status] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/check-results-file.yml:2 ok: [managed-node01] => {"changed": false, "stat": {"atime": 1766003438.517267, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 32, "charset": "us-ascii", "checksum": "c26880073b7937edc5e101b6f6dd6dc16c2273ec", "ctime": 1766003438.517267, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 46137425, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1766003438.517267, "nlink": 1, "path": "/var/log/leapp/leapp-report.txt", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 12814, "uid": 0, "version": "18446744072254903615", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} TASK [infra.leapp.analysis : check-results-file | Check that result file exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/check-results-file.yml:7 ok: [managed-node01] => { "changed": false, "msg": "All assertions passed" } TASK [analysis-leapp | Run parse_leapp_report to check for inhibitors] ********* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:100 TASK [infra.leapp.common : parse_leapp_report | Default upgrade_inhibited to false] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:12 ok: [managed-node01] => {"ansible_facts": {"upgrade_inhibited": false}, "changed": false} TASK [infra.leapp.common : parse_leapp_report | Collect human readable report results] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:16 ok: [managed-node01] => {"changed": false, "content": "Risk Factor: high (inhibitor)
Title: Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.
Summary: Support for the following RHEL 7 device drivers has been removed in RHEL 8:
     - pata_acpi

Related links:
    - Leapp preupgrade getting "Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed." : https://access.redhat.com/solutions/6971716
    - Leapp upgrade fail with error "Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.": https://access.redhat.com/solutions/5436131
Key: f08a07da902958defa4f5c2699fae9ec2eb67c5b
----------------------------------------
Risk Factor: high (inhibitor)
Title: Use of NFS detected. Upgrade can't proceed
Summary: NFS is currently not supported by the inplace upgrade.
We have found NFS usage at the following locations:
- NFS shares found in /etc/fstab:
 - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat
 - nest.test.redhat.com:/mnt/qa /mnt/qa
 - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive
 - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist
 - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew
 - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch

Related links:
    - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006
Remediation: [hint] Disable NFS temporarily for the upgrade if possible.
Key: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed
----------------------------------------
Risk Factor: high (inhibitor)
Title: Use of CIFS detected. Upgrade can't proceed
Summary: CIFS is currently not supported by the inplace upgrade.
Related links:
    - Leapp upgrade failed with error "Inhibitor: Use of CIFS detected. Upgrade cannot proceed": https://access.redhat.com/solutions/6964304
Remediation: [hint] Comment out CIFS entries to proceed with the upgrade.
Key: d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a
----------------------------------------
Risk Factor: high 
Title: Packages available in excluded repositories will not be installed
Summary: 2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled "Excluded target system repositories" for details.
The list of these packages:
- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)
- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)
Key: 2437e204808f987477c0e9be8e4c95b3a87a9f3e
----------------------------------------
Risk Factor: high 
Title: Upgrade is unsupported
Summary: Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.

Key: 9e5088e3c1f371e020ec777c3d86578f4be143cf
----------------------------------------
Risk Factor: high 
Title: GRUB2 core will be automatically updated during the upgrade
Summary: On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running "grub2-install" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.
Key: ac7030e05d2ee248d34f08a9fa040b352bc410a3
----------------------------------------
Risk Factor: high 
Title: Difference in Python versions and support in RHEL 8
Summary: In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python
Related links:
    - Difference in Python versions and support in RHEL 8: https://red.ht/rhel-8-python
Remediation: [hint] Please run "alternatives --set python /usr/bin/python3" after upgrade
Key: 0c98585b1d8d252eb540bf61560094f3495351f5
----------------------------------------
Risk Factor: medium 
Title: Module pam_pkcs11 will be removed from PAM configuration
Summary: Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.
Remediation: [hint] Configure SSSD to replace pam_pkcs11
Key: bf47e7305d6805e8bbeaa7593cf01e38030c23f3
----------------------------------------
Risk Factor: medium 
Title: chrony using default configuration
Summary: default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives
Key: c4222ebd18730a76f6bc7b3b66df898b106e6554
----------------------------------------
Risk Factor: low 
Title: Detected broken systemd symlinks for non-existing services
Summary: Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:
    - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service
Remediation: [hint] Remove the invalid symlinks before the upgrade.
[command] /usr/bin/rm /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service
Key: be2083fee03f5f0a708fd193d82d2fe20aee7217
----------------------------------------
Risk Factor: low 
Title: Some enabled RPM repositories are unknown to Leapp
Summary: The following repositories with Red Hat-signed packages are unknown to Leapp:
- rhel
And the following packages installed from those repositories may not be upgraded:
- libsolv
- python-perf
- kernel-tools-libs
- libreport-filesystem
- json-glib
- librepo
- kernel-tools
Remediation: [hint] You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket
Key: 8e89e20c645cea600b240156071d81c64daab7ad
----------------------------------------
Risk Factor: low 
Title: Postfix has incompatible changes in the next major version
Summary: Postfix 3.x has so called "compatibility safety net" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.
The backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.
It can be turned on by running:  "postconf -e compatibility_level=0
It can be turned off by running: "postconf -e compatibility_level=2

In the Postfix MySQL database client, the default "option_group" value has changed to "client", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set "option_group" to the empty string.

The postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.

Postfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to "auto", and introduces a new parameter "tls_eecdh_auto_curves" with the names of curves that may be negotiated.

The "master.cf" chroot default value has changed from "y" (yes) to "n" (no). This applies to master.cf services where chroot field is not explicitly specified.

The "append_dot_mydomain" default value has changed from "yes" to "no". You may need changing it to "yes" if senders cannot use complete domain names in e-mail addresses.

The "relay_domains" default value has changed from "$mydestination" to the empty value. This could result in unexpected "Relay access denied" errors or ETRN errors, because now will postfix by default relay only for the localhost.

The "mynetworks_style" default value has changed from "subnet" to "host". This parameter is used to implement the "permit_mynetworks" feature. The change could result in unexpected "access denied" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.

Postfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.

Key: 5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33
----------------------------------------
Risk Factor: low 
Title: Grep has incompatible changes in the next major version
Summary: If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.
The 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.
In locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.
When searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.
The 'grep -z' no longer automatically treats the byte '\200' as binary data.
Context no longer excludes selected lines omitted because of -m. For example, 'grep "^" -m1 -A1' now outputs the first two input lines, not just the first line.

Remediation: [hint] Please update your scripts to be compatible with the changes.
Key: 94665a499e2eeee35eca3e7093a7abe183384b16
----------------------------------------
Risk Factor: low 
Title: SElinux will be set to permissive mode
Summary: SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.
Remediation: [hint] Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the "/root/tmp_leapp_py3" SElinux warnings.
Key: 39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f
----------------------------------------
Risk Factor: info 
Title: Excluded target system repositories
Summary: The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.
- codeready-builder-beta-for-rhel-8-s390x-rpms
- codeready-builder-beta-for-rhel-8-ppc64le-rpms
- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms
- codeready-builder-for-rhel-8-aarch64-eus-rpms
- codeready-builder-for-rhel-8-ppc64le-eus-rpms
- codeready-builder-beta-for-rhel-8-x86_64-rpms
- codeready-builder-for-rhel-8-aarch64-rpms
- codeready-builder-for-rhel-8-s390x-rpms
- codeready-builder-for-rhel-8-s390x-eus-rpms
- codeready-builder-for-rhel-8-x86_64-eus-rpms
- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms
- codeready-builder-beta-for-rhel-8-aarch64-rpms
- codeready-builder-for-rhel-8-rhui-rpms
- codeready-builder-for-rhel-8-x86_64-rhui-rpms
- codeready-builder-for-rhel-8-x86_64-rpms
- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms
- codeready-builder-for-rhel-8-ppc64le-rpms
Remediation: [hint] If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).
Key: 1b9132cb2362ae7830e48eee7811be9527747de8
----------------------------------------
Risk Factor: info 
Title: Current PAM and nsswitch.conf configuration will be kept.
Summary: There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.
Key: 40c4ab1da4a30dc1ca40e543f6385e1336d8810c
----------------------------------------
Risk Factor: info 
Title: SElinux relabeling will be scheduled
Summary: SElinux relabeling will be scheduled as the status is permissive/enforcing.
Key: 8fb81863f8413bd617c2a55b69b8e10ff03d7c72
----------------------------------------
", "encoding": "base64", "source": "/var/log/leapp/leapp-report.txt"} TASK [infra.leapp.common : parse_leapp_report | Collect JSON report results] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:21 ok: [managed-node01] => {"changed": false, "content": "{
  "leapp_run_id": "6478f090-418e-4a7b-93fb-681c4cc7ce32", 
  "entries": [
    {
      "groups": [
        "repository", 
        "failure"
      ], 
      "title": "Excluded target system repositories", 
      "timeStamp": "2025-12-17T20:30:31.291174Z", 
      "hostname": "managed-node01", 
      "detail": {
        "remediations": [
          {
            "type": "hint", 
            "context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times)."
          }
        ]
      }, 
      "actor": "repositories_blacklist", 
      "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms", 
      "audience": "sysadmin", 
      "key": "1b9132cb2362ae7830e48eee7811be9527747de8", 
      "id": "7907c1028b94da63ef5c31b0d71f6afbf6d5294488d8bbf732fab89abded587f", 
      "severity": "info"
    }, 
    {
      "groups": [
        "repository"
      ], 
      "title": "Packages available in excluded repositories will not be installed", 
      "timeStamp": "2025-12-17T20:30:33.446892Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "python3-pyxattr"
          }, 
          {
            "scheme": "package", 
            "title": "rpcgen"
          }
        ]
      }, 
      "actor": "pes_events_scanner", 
      "summary": "2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", 
      "audience": "sysadmin", 
      "key": "2437e204808f987477c0e9be8e4c95b3a87a9f3e", 
      "id": "80eb92ab09b52dddc2477333fb80ef366f0f3fc7fa0c3a03f1b2361eeeb6cb62", 
      "severity": "high"
    }, 
    {
      "groups": [
        "kernel", 
        "drivers", 
        "inhibitor"
      ], 
      "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", 
      "timeStamp": "2025-12-17T20:30:34.215904Z", 
      "hostname": "managed-node01", 
      "detail": {
        "external": [
          {
            "url": "https://access.redhat.com/solutions/6971716", 
            "title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" "
          }, 
          {
            "url": "https://access.redhat.com/solutions/5436131", 
            "title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\""
          }
        ]
      }, 
      "actor": "check_detected_devices_and_drivers", 
      "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n     - pata_acpi\n", 
      "audience": "sysadmin", 
      "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", 
      "id": "ad1384a8f596f5cd6ea4d16958410dde9e4a1d5e65ca33a263697c69e7e80f83", 
      "severity": "high"
    }, 
    {
      "groups": [
        "filesystem"
      ], 
      "title": "Detected broken systemd symlinks for non-existing services", 
      "timeStamp": "2025-12-17T20:30:34.408747Z", 
      "hostname": "managed-node01", 
      "detail": {
        "remediations": [
          {
            "type": "hint", 
            "context": "Remove the invalid symlinks before the upgrade."
          }, 
          {
            "type": "command", 
            "context": [
              "/usr/bin/rm", 
              "/etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service"
            ]
          }
        ]
      }, 
      "actor": "check_systemd_broken_symlinks", 
      "summary": "Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:\n    - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", 
      "audience": "sysadmin", 
      "key": "be2083fee03f5f0a708fd193d82d2fe20aee7217", 
      "id": "660ab36acf0a54e80f6fe1076704f07db724c3eac376f75d21a0611896e2a32e", 
      "severity": "low"
    }, 
    {
      "groups": [
        "upgrade process", 
        "sanity"
      ], 
      "title": "Upgrade is unsupported", 
      "timeStamp": "2025-12-17T20:30:34.558376Z", 
      "hostname": "managed-node01", 
      "actor": "unsupported_upgrade_check", 
      "summary": "Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.\n", 
      "audience": "sysadmin", 
      "key": "9e5088e3c1f371e020ec777c3d86578f4be143cf", 
      "id": "b264ef04e695982ec64e6f4eac24630d3caadb6eb18639e0bac3270c2dd8318f", 
      "severity": "high"
    }, 
    {
      "groups": [
        "repository"
      ], 
      "title": "Some enabled RPM repositories are unknown to Leapp", 
      "timeStamp": "2025-12-17T20:30:34.711173Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "libsolv"
          }, 
          {
            "scheme": "package", 
            "title": "python-perf"
          }, 
          {
            "scheme": "package", 
            "title": "kernel-tools-libs"
          }, 
          {
            "scheme": "package", 
            "title": "libreport-filesystem"
          }, 
          {
            "scheme": "package", 
            "title": "json-glib"
          }, 
          {
            "scheme": "package", 
            "title": "librepo"
          }, 
          {
            "scheme": "package", 
            "title": "kernel-tools"
          }, 
          {
            "scheme": "repository", 
            "title": "rhel"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket"
          }
        ]
      }, 
      "actor": "check_skipped_repositories", 
      "summary": "The following repositories with Red Hat-signed packages are unknown to Leapp:\n- rhel\nAnd the following packages installed from those repositories may not be upgraded:\n- libsolv\n- python-perf\n- kernel-tools-libs\n- libreport-filesystem\n- json-glib\n- librepo\n- kernel-tools", 
      "audience": "sysadmin", 
      "key": "8e89e20c645cea600b240156071d81c64daab7ad", 
      "id": "8f22ef4d17edac7f4cef866653aac7ef2ff150a7433b59c74bb08fa6c2f580c7", 
      "severity": "low"
    }, 
    {
      "groups": [
        "boot"
      ], 
      "title": "GRUB2 core will be automatically updated during the upgrade", 
      "timeStamp": "2025-12-17T20:30:34.898281Z", 
      "hostname": "managed-node01", 
      "actor": "check_grub_core", 
      "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", 
      "audience": "sysadmin", 
      "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", 
      "id": "8fd5990c7250790c8d05e397ce91c38a07b1f9b5a279e428bdd0fde5f95e0944", 
      "severity": "high"
    }, 
    {
      "groups": [
        "filesystem", 
        "network", 
        "inhibitor"
      ], 
      "title": "Use of NFS detected. Upgrade can't proceed", 
      "timeStamp": "2025-12-17T20:30:35.345678Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "file", 
            "title": "/etc/fstab"
          }
        ], 
        "external": [
          {
            "url": "https://access.redhat.com/solutions/6964006", 
            "title": "Why does leapp upgrade fail on detecting NFS during upgrade?"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Disable NFS temporarily for the upgrade if possible."
          }
        ]
      }, 
      "actor": "check_nfs", 
      "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", 
      "audience": "sysadmin", 
      "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", 
      "id": "de9851ec496751bac6de9b0065a70b34421f3eaff05277e8bf6b30edf2ae0a47", 
      "severity": "high"
    }, 
    {
      "groups": [
        "python"
      ], 
      "title": "Difference in Python versions and support in RHEL 8", 
      "timeStamp": "2025-12-17T20:30:35.504957Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "python"
          }, 
          {
            "scheme": "package", 
            "title": "python2"
          }, 
          {
            "scheme": "package", 
            "title": "python3"
          }
        ], 
        "external": [
          {
            "url": "https://red.ht/rhel-8-python", 
            "title": "Difference in Python versions and support in RHEL 8"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Please run \"alternatives --set python /usr/bin/python3\" after upgrade"
          }
        ]
      }, 
      "actor": "python_inform_user", 
      "summary": "In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", 
      "audience": "developer", 
      "key": "0c98585b1d8d252eb540bf61560094f3495351f5", 
      "id": "58fc3b82a0f26a9ce2222184f72ecdddc603555281328e7eb2360657225550e6", 
      "severity": "high"
    }, 
    {
      "groups": [
        "authentication", 
        "security", 
        "tools"
      ], 
      "title": "Module pam_pkcs11 will be removed from PAM configuration", 
      "timeStamp": "2025-12-17T20:30:35.926628Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "sssd"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Configure SSSD to replace pam_pkcs11"
          }
        ]
      }, 
      "actor": "removed_pam_modules_check", 
      "summary": "Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.", 
      "audience": "sysadmin", 
      "key": "bf47e7305d6805e8bbeaa7593cf01e38030c23f3", 
      "id": "61466ba489e9f0fbc678a84620e01e5907073304611c3962764996af9e9f657f", 
      "severity": "medium"
    }, 
    {
      "groups": [
        "services", 
        "email"
      ], 
      "title": "Postfix has incompatible changes in the next major version", 
      "timeStamp": "2025-12-17T20:30:36.784875Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "postfix"
          }
        ]
      }, 
      "actor": "check_postfix", 
      "summary": "Postfix 3.x has so called \"compatibility safety net\" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.\nThe backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.\nIt can be turned on by running:  \"postconf -e compatibility_level=0\nIt can be turned off by running: \"postconf -e compatibility_level=2\n\nIn the Postfix MySQL database client, the default \"option_group\" value has changed to \"client\", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set \"option_group\" to the empty string.\n\nThe postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.\n\nPostfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to \"auto\", and introduces a new parameter \"tls_eecdh_auto_curves\" with the names of curves that may be negotiated.\n\nThe \"master.cf\" chroot default value has changed from \"y\" (yes) to \"n\" (no). This applies to master.cf services where chroot field is not explicitly specified.\n\nThe \"append_dot_mydomain\" default value has changed from \"yes\" to \"no\". You may need changing it to \"yes\" if senders cannot use complete domain names in e-mail addresses.\n\nThe \"relay_domains\" default value has changed from \"$mydestination\" to the empty value. This could result in unexpected \"Relay access denied\" errors or ETRN errors, because now will postfix by default relay only for the localhost.\n\nThe \"mynetworks_style\" default value has changed from \"subnet\" to \"host\". This parameter is used to implement the \"permit_mynetworks\" feature. The change could result in unexpected \"access denied\" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.\n\nPostfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.\n", 
      "audience": "sysadmin", 
      "key": "5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33", 
      "id": "32f81ba683e5eb97933009c00adaf8de0582c338c8f10ddb409882dc9d931dc3", 
      "severity": "low"
    }, 
    {
      "groups": [
        "services", 
        "time management"
      ], 
      "title": "chrony using default configuration", 
      "timeStamp": "2025-12-17T20:30:37.310655Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "ntpd"
          }, 
          {
            "scheme": "package", 
            "title": "chrony"
          }, 
          {
            "scheme": "file", 
            "title": "/etc/chrony.conf"
          }
        ]
      }, 
      "actor": "check_chrony", 
      "summary": "default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives", 
      "audience": "sysadmin", 
      "key": "c4222ebd18730a76f6bc7b3b66df898b106e6554", 
      "id": "10296b29943bc119f732c818e068094a9d87a1d9ab6d5922ea10d6c289151e3b", 
      "severity": "medium"
    }, 
    {
      "groups": [
        "filesystem", 
        "network", 
        "inhibitor"
      ], 
      "title": "Use of CIFS detected. Upgrade can't proceed", 
      "timeStamp": "2025-12-17T20:30:37.583778Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "file", 
            "title": "/etc/fstab"
          }
        ], 
        "external": [
          {
            "url": "https://access.redhat.com/solutions/6964304", 
            "title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\""
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Comment out CIFS entries to proceed with the upgrade."
          }
        ]
      }, 
      "actor": "check_cifs", 
      "summary": "CIFS is currently not supported by the inplace upgrade.", 
      "audience": "sysadmin", 
      "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", 
      "id": "383ed1d8ddea078f8852cef39692d29113338007ca4fc5400e131ce473200210", 
      "severity": "high"
    }, 
    {
      "groups": [
        "authentication", 
        "security", 
        "tools"
      ], 
      "title": "Current PAM and nsswitch.conf configuration will be kept.", 
      "timeStamp": "2025-12-17T20:30:37.626560Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "authselect"
          }, 
          {
            "scheme": "package", 
            "title": "authconfig"
          }, 
          {
            "scheme": "file", 
            "title": "/etc/nsswitch.conf"
          }
        ]
      }, 
      "actor": "authselect_check", 
      "summary": "There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.", 
      "audience": "sysadmin", 
      "key": "40c4ab1da4a30dc1ca40e543f6385e1336d8810c", 
      "id": "5ca7905c765b9d764518a5ac59f7683675a4d899047255e4a0f2cffa95ce89c5", 
      "severity": "info"
    }, 
    {
      "groups": [
        "tools"
      ], 
      "title": "Grep has incompatible changes in the next major version", 
      "timeStamp": "2025-12-17T20:30:37.746124Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "grep"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Please update your scripts to be compatible with the changes."
          }
        ]
      }, 
      "actor": "checkgrep", 
      "summary": "If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.\nThe 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.\nIn locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.\nWhen searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.\nThe 'grep -z' no longer automatically treats the byte '\\200' as binary data.\nContext no longer excludes selected lines omitted because of -m. For example, 'grep \"^\" -m1 -A1' now outputs the first two input lines, not just the first line.\n", 
      "audience": "sysadmin", 
      "key": "94665a499e2eeee35eca3e7093a7abe183384b16", 
      "id": "13f2dbe811b055760849df5051947ae3dd8961e12c770933b7f79836dce92d0a", 
      "severity": "low"
    }, 
    {
      "groups": [
        "selinux", 
        "security"
      ], 
      "title": "SElinux relabeling will be scheduled", 
      "timeStamp": "2025-12-17T20:30:38.346479Z", 
      "hostname": "managed-node01", 
      "actor": "check_se_linux", 
      "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", 
      "audience": "sysadmin", 
      "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", 
      "id": "eda897d2cc54c61b4805fb8d03518931960bc57dc545ec81c4c1f7185e89576a", 
      "severity": "info"
    }, 
    {
      "groups": [
        "selinux", 
        "security"
      ], 
      "title": "SElinux will be set to permissive mode", 
      "timeStamp": "2025-12-17T20:30:38.350404Z", 
      "hostname": "managed-node01", 
      "detail": {
        "remediations": [
          {
            "type": "hint", 
            "context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings."
          }
        ]
      }, 
      "actor": "check_se_linux", 
      "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", 
      "audience": "sysadmin", 
      "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", 
      "id": "4311d4c4c504cc57a3ebe89fcee6acb25415555f703420db72b791d7d18f69e2", 
      "severity": "low"
    }
  ]
}
", "encoding": "base64", "source": "/var/log/leapp/leapp-report.json"} TASK [infra.leapp.common : parse_leapp_report | Parse report results] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:26 ok: [managed-node01] => {"ansible_facts": {"leapp_report_json": {"entries": [{"actor": "repositories_blacklist", "audience": "sysadmin", "detail": {"remediations": [{"context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "type": "hint"}]}, "groups": ["repository", "failure"], "hostname": "managed-node01", "id": "7907c1028b94da63ef5c31b0d71f6afbf6d5294488d8bbf732fab89abded587f", "key": "1b9132cb2362ae7830e48eee7811be9527747de8", "severity": "info", "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms", "timeStamp": "2025-12-17T20:30:31.291174Z", "title": "Excluded target system repositories"}, {"actor": "pes_events_scanner", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "python3-pyxattr"}, {"scheme": "package", "title": "rpcgen"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "80eb92ab09b52dddc2477333fb80ef366f0f3fc7fa0c3a03f1b2361eeeb6cb62", "key": "2437e204808f987477c0e9be8e4c95b3a87a9f3e", "severity": "high", "summary": "2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", "timeStamp": "2025-12-17T20:30:33.446892Z", "title": "Packages available in excluded repositories will not be installed"}, {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "ad1384a8f596f5cd6ea4d16958410dde9e4a1d5e65ca33a263697c69e7e80f83", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-12-17T20:30:34.215904Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}, {"actor": "check_systemd_broken_symlinks", "audience": "sysadmin", "detail": {"remediations": [{"context": "Remove the invalid symlinks before the upgrade.", "type": "hint"}, {"context": ["/usr/bin/rm", "/etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service"], "type": "command"}]}, "groups": ["filesystem"], "hostname": "managed-node01", "id": "660ab36acf0a54e80f6fe1076704f07db724c3eac376f75d21a0611896e2a32e", "key": "be2083fee03f5f0a708fd193d82d2fe20aee7217", "severity": "low", "summary": "Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:\n - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", "timeStamp": "2025-12-17T20:30:34.408747Z", "title": "Detected broken systemd symlinks for non-existing services"}, {"actor": "unsupported_upgrade_check", "audience": "sysadmin", "groups": ["upgrade process", "sanity"], "hostname": "managed-node01", "id": "b264ef04e695982ec64e6f4eac24630d3caadb6eb18639e0bac3270c2dd8318f", "key": "9e5088e3c1f371e020ec777c3d86578f4be143cf", "severity": "high", "summary": "Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.\n", "timeStamp": "2025-12-17T20:30:34.558376Z", "title": "Upgrade is unsupported"}, {"actor": "check_skipped_repositories", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "libsolv"}, {"scheme": "package", "title": "python-perf"}, {"scheme": "package", "title": "kernel-tools-libs"}, {"scheme": "package", "title": "libreport-filesystem"}, {"scheme": "package", "title": "json-glib"}, {"scheme": "package", "title": "librepo"}, {"scheme": "package", "title": "kernel-tools"}, {"scheme": "repository", "title": "rhel"}], "remediations": [{"context": "You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket", "type": "hint"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "8f22ef4d17edac7f4cef866653aac7ef2ff150a7433b59c74bb08fa6c2f580c7", "key": "8e89e20c645cea600b240156071d81c64daab7ad", "severity": "low", "summary": "The following repositories with Red Hat-signed packages are unknown to Leapp:\n- rhel\nAnd the following packages installed from those repositories may not be upgraded:\n- libsolv\n- python-perf\n- kernel-tools-libs\n- libreport-filesystem\n- json-glib\n- librepo\n- kernel-tools", "timeStamp": "2025-12-17T20:30:34.711173Z", "title": "Some enabled RPM repositories are unknown to Leapp"}, {"actor": "check_grub_core", "audience": "sysadmin", "groups": ["boot"], "hostname": "managed-node01", "id": "8fd5990c7250790c8d05e397ce91c38a07b1f9b5a279e428bdd0fde5f95e0944", "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", "severity": "high", "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", "timeStamp": "2025-12-17T20:30:34.898281Z", "title": "GRUB2 core will be automatically updated during the upgrade"}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "de9851ec496751bac6de9b0065a70b34421f3eaff05277e8bf6b30edf2ae0a47", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2025-12-17T20:30:35.345678Z", "title": "Use of NFS detected. Upgrade can't proceed"}, {"actor": "python_inform_user", "audience": "developer", "detail": {"external": [{"title": "Difference in Python versions and support in RHEL 8", "url": "https://red.ht/rhel-8-python"}], "related_resources": [{"scheme": "package", "title": "python"}, {"scheme": "package", "title": "python2"}, {"scheme": "package", "title": "python3"}], "remediations": [{"context": "Please run \"alternatives --set python /usr/bin/python3\" after upgrade", "type": "hint"}]}, "groups": ["python"], "hostname": "managed-node01", "id": "58fc3b82a0f26a9ce2222184f72ecdddc603555281328e7eb2360657225550e6", "key": "0c98585b1d8d252eb540bf61560094f3495351f5", "severity": "high", "summary": "In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", "timeStamp": "2025-12-17T20:30:35.504957Z", "title": "Difference in Python versions and support in RHEL 8"}, {"actor": "removed_pam_modules_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "sssd"}], "remediations": [{"context": "Configure SSSD to replace pam_pkcs11", "type": "hint"}]}, "groups": ["authentication", "security", "tools"], "hostname": "managed-node01", "id": "61466ba489e9f0fbc678a84620e01e5907073304611c3962764996af9e9f657f", "key": "bf47e7305d6805e8bbeaa7593cf01e38030c23f3", "severity": "medium", "summary": "Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.", "timeStamp": "2025-12-17T20:30:35.926628Z", "title": "Module pam_pkcs11 will be removed from PAM configuration"}, {"actor": "check_postfix", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "postfix"}]}, "groups": ["services", "email"], "hostname": "managed-node01", "id": "32f81ba683e5eb97933009c00adaf8de0582c338c8f10ddb409882dc9d931dc3", "key": "5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33", "severity": "low", "summary": "Postfix 3.x has so called \"compatibility safety net\" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.\nThe backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.\nIt can be turned on by running: \"postconf -e compatibility_level=0\nIt can be turned off by running: \"postconf -e compatibility_level=2\n\nIn the Postfix MySQL database client, the default \"option_group\" value has changed to \"client\", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set \"option_group\" to the empty string.\n\nThe postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.\n\nPostfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to \"auto\", and introduces a new parameter \"tls_eecdh_auto_curves\" with the names of curves that may be negotiated.\n\nThe \"master.cf\" chroot default value has changed from \"y\" (yes) to \"n\" (no). This applies to master.cf services where chroot field is not explicitly specified.\n\nThe \"append_dot_mydomain\" default value has changed from \"yes\" to \"no\". You may need changing it to \"yes\" if senders cannot use complete domain names in e-mail addresses.\n\nThe \"relay_domains\" default value has changed from \"$mydestination\" to the empty value. This could result in unexpected \"Relay access denied\" errors or ETRN errors, because now will postfix by default relay only for the localhost.\n\nThe \"mynetworks_style\" default value has changed from \"subnet\" to \"host\". This parameter is used to implement the \"permit_mynetworks\" feature. The change could result in unexpected \"access denied\" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.\n\nPostfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.\n", "timeStamp": "2025-12-17T20:30:36.784875Z", "title": "Postfix has incompatible changes in the next major version"}, {"actor": "check_chrony", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "ntpd"}, {"scheme": "package", "title": "chrony"}, {"scheme": "file", "title": "/etc/chrony.conf"}]}, "groups": ["services", "time management"], "hostname": "managed-node01", "id": "10296b29943bc119f732c818e068094a9d87a1d9ab6d5922ea10d6c289151e3b", "key": "c4222ebd18730a76f6bc7b3b66df898b106e6554", "severity": "medium", "summary": "default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives", "timeStamp": "2025-12-17T20:30:37.310655Z", "title": "chrony using default configuration"}, {"actor": "check_cifs", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "383ed1d8ddea078f8852cef39692d29113338007ca4fc5400e131ce473200210", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2025-12-17T20:30:37.583778Z", "title": "Use of CIFS detected. Upgrade can't proceed"}, {"actor": "authselect_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "authselect"}, {"scheme": "package", "title": "authconfig"}, {"scheme": "file", "title": "/etc/nsswitch.conf"}]}, "groups": ["authentication", "security", "tools"], "hostname": "managed-node01", "id": "5ca7905c765b9d764518a5ac59f7683675a4d899047255e4a0f2cffa95ce89c5", "key": "40c4ab1da4a30dc1ca40e543f6385e1336d8810c", "severity": "info", "summary": "There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.", "timeStamp": "2025-12-17T20:30:37.626560Z", "title": "Current PAM and nsswitch.conf configuration will be kept."}, {"actor": "checkgrep", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "grep"}], "remediations": [{"context": "Please update your scripts to be compatible with the changes.", "type": "hint"}]}, "groups": ["tools"], "hostname": "managed-node01", "id": "13f2dbe811b055760849df5051947ae3dd8961e12c770933b7f79836dce92d0a", "key": "94665a499e2eeee35eca3e7093a7abe183384b16", "severity": "low", "summary": "If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.\nThe 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.\nIn locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.\nWhen searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.\nThe 'grep -z' no longer automatically treats the byte '\\200' as binary data.\nContext no longer excludes selected lines omitted because of -m. For example, 'grep \"^\" -m1 -A1' now outputs the first two input lines, not just the first line.\n", "timeStamp": "2025-12-17T20:30:37.746124Z", "title": "Grep has incompatible changes in the next major version"}, {"actor": "check_se_linux", "audience": "sysadmin", "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "eda897d2cc54c61b4805fb8d03518931960bc57dc545ec81c4c1f7185e89576a", "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", "severity": "info", "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", "timeStamp": "2025-12-17T20:30:38.346479Z", "title": "SElinux relabeling will be scheduled"}, {"actor": "check_se_linux", "audience": "sysadmin", "detail": {"remediations": [{"context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.", "type": "hint"}]}, "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "4311d4c4c504cc57a3ebe89fcee6acb25415555f703420db72b791d7d18f69e2", "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", "severity": "low", "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", "timeStamp": "2025-12-17T20:30:38.350404Z", "title": "SElinux will be set to permissive mode"}], "leapp_run_id": "6478f090-418e-4a7b-93fb-681c4cc7ce32"}, "leapp_report_txt": ["Risk Factor: high (inhibitor)", "Title: Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", "Summary: Support for the following RHEL 7 device drivers has been removed in RHEL 8:", " - pata_acpi", "", "Related links:", " - Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" : https://access.redhat.com/solutions/6971716", " - Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\": https://access.redhat.com/solutions/5436131", "Key: f08a07da902958defa4f5c2699fae9ec2eb67c5b", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Use of NFS detected. Upgrade can't proceed", "Summary: NFS is currently not supported by the inplace upgrade.", "We have found NFS usage at the following locations:", "- NFS shares found in /etc/fstab:", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat", " - nest.test.redhat.com:/mnt/qa /mnt/qa", " - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive", " - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch", "", "Related links:", " - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006", "Remediation: [hint] Disable NFS temporarily for the upgrade if possible.", "Key: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Use of CIFS detected. Upgrade can't proceed", "Summary: CIFS is currently not supported by the inplace upgrade.", "Related links:", " - Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\": https://access.redhat.com/solutions/6964304", "Remediation: [hint] Comment out CIFS entries to proceed with the upgrade.", "Key: d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "----------------------------------------", "Risk Factor: high ", "Title: Packages available in excluded repositories will not be installed", "Summary: 2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.", "The list of these packages:", "- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", "- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", "Key: 2437e204808f987477c0e9be8e4c95b3a87a9f3e", "----------------------------------------", "Risk Factor: high ", "Title: Upgrade is unsupported", "Summary: Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.", "", "Key: 9e5088e3c1f371e020ec777c3d86578f4be143cf", "----------------------------------------", "Risk Factor: high ", "Title: GRUB2 core will be automatically updated during the upgrade", "Summary: On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", "Key: ac7030e05d2ee248d34f08a9fa040b352bc410a3", "----------------------------------------", "Risk Factor: high ", "Title: Difference in Python versions and support in RHEL 8", "Summary: In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", "Related links:", " - Difference in Python versions and support in RHEL 8: https://red.ht/rhel-8-python", "Remediation: [hint] Please run \"alternatives --set python /usr/bin/python3\" after upgrade", "Key: 0c98585b1d8d252eb540bf61560094f3495351f5", "----------------------------------------", "Risk Factor: medium ", "Title: Module pam_pkcs11 will be removed from PAM configuration", "Summary: Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.", "Remediation: [hint] Configure SSSD to replace pam_pkcs11", "Key: bf47e7305d6805e8bbeaa7593cf01e38030c23f3", "----------------------------------------", "Risk Factor: medium ", "Title: chrony using default configuration", "Summary: default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives", "Key: c4222ebd18730a76f6bc7b3b66df898b106e6554", "----------------------------------------", "Risk Factor: low ", "Title: Detected broken systemd symlinks for non-existing services", "Summary: Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:", " - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", "Remediation: [hint] Remove the invalid symlinks before the upgrade.", "[command] /usr/bin/rm /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", "Key: be2083fee03f5f0a708fd193d82d2fe20aee7217", "----------------------------------------", "Risk Factor: low ", "Title: Some enabled RPM repositories are unknown to Leapp", "Summary: The following repositories with Red Hat-signed packages are unknown to Leapp:", "- rhel", "And the following packages installed from those repositories may not be upgraded:", "- libsolv", "- python-perf", "- kernel-tools-libs", "- libreport-filesystem", "- json-glib", "- librepo", "- kernel-tools", "Remediation: [hint] You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket", "Key: 8e89e20c645cea600b240156071d81c64daab7ad", "----------------------------------------", "Risk Factor: low ", "Title: Postfix has incompatible changes in the next major version", "Summary: Postfix 3.x has so called \"compatibility safety net\" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.", "The backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.", "It can be turned on by running: \"postconf -e compatibility_level=0", "It can be turned off by running: \"postconf -e compatibility_level=2", "", "In the Postfix MySQL database client, the default \"option_group\" value has changed to \"client\", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set \"option_group\" to the empty string.", "", "The postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.", "", "Postfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to \"auto\", and introduces a new parameter \"tls_eecdh_auto_curves\" with the names of curves that may be negotiated.", "", "The \"master.cf\" chroot default value has changed from \"y\" (yes) to \"n\" (no). This applies to master.cf services where chroot field is not explicitly specified.", "", "The \"append_dot_mydomain\" default value has changed from \"yes\" to \"no\". You may need changing it to \"yes\" if senders cannot use complete domain names in e-mail addresses.", "", "The \"relay_domains\" default value has changed from \"$mydestination\" to the empty value. This could result in unexpected \"Relay access denied\" errors or ETRN errors, because now will postfix by default relay only for the localhost.", "", "The \"mynetworks_style\" default value has changed from \"subnet\" to \"host\". This parameter is used to implement the \"permit_mynetworks\" feature. The change could result in unexpected \"access denied\" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.", "", "Postfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.", "", "Key: 5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33", "----------------------------------------", "Risk Factor: low ", "Title: Grep has incompatible changes in the next major version", "Summary: If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.", "The 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.", "In locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.", "When searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.", "The 'grep -z' no longer automatically treats the byte '\\200' as binary data.", "Context no longer excludes selected lines omitted because of -m. For example, 'grep \"^\" -m1 -A1' now outputs the first two input lines, not just the first line.", "", "Remediation: [hint] Please update your scripts to be compatible with the changes.", "Key: 94665a499e2eeee35eca3e7093a7abe183384b16", "----------------------------------------", "Risk Factor: low ", "Title: SElinux will be set to permissive mode", "Summary: SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", "Remediation: [hint] Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.", "Key: 39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", "----------------------------------------", "Risk Factor: info ", "Title: Excluded target system repositories", "Summary: The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.", "- codeready-builder-beta-for-rhel-8-s390x-rpms", "- codeready-builder-beta-for-rhel-8-ppc64le-rpms", "- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms", "- codeready-builder-for-rhel-8-aarch64-eus-rpms", "- codeready-builder-for-rhel-8-ppc64le-eus-rpms", "- codeready-builder-beta-for-rhel-8-x86_64-rpms", "- codeready-builder-for-rhel-8-aarch64-rpms", "- codeready-builder-for-rhel-8-s390x-rpms", "- codeready-builder-for-rhel-8-s390x-eus-rpms", "- codeready-builder-for-rhel-8-x86_64-eus-rpms", "- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms", "- codeready-builder-beta-for-rhel-8-aarch64-rpms", "- codeready-builder-for-rhel-8-rhui-rpms", "- codeready-builder-for-rhel-8-x86_64-rhui-rpms", "- codeready-builder-for-rhel-8-x86_64-rpms", "- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms", "- codeready-builder-for-rhel-8-ppc64le-rpms", "Remediation: [hint] If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "Key: 1b9132cb2362ae7830e48eee7811be9527747de8", "----------------------------------------", "Risk Factor: info ", "Title: Current PAM and nsswitch.conf configuration will be kept.", "Summary: There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.", "Key: 40c4ab1da4a30dc1ca40e543f6385e1336d8810c", "----------------------------------------", "Risk Factor: info ", "Title: SElinux relabeling will be scheduled", "Summary: SElinux relabeling will be scheduled as the status is permissive/enforcing.", "Key: 8fb81863f8413bd617c2a55b69b8e10ff03d7c72", "----------------------------------------", ""]}, "changed": false} TASK [infra.leapp.common : parse_leapp_report | Check for inhibitors] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:32 skipping: [managed-node01] => (item={'groups': ['repository', 'failure'], 'title': 'Excluded target system repositories', 'timeStamp': '2025-12-17T20:30:31.291174Z', 'hostname': 'managed-node01', 'detail': {'remediations': [{'type': 'hint', 'context': 'If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).'}]}, 'actor': 'repositories_blacklist', 'summary': 'The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms', 'audience': 'sysadmin', 'key': '1b9132cb2362ae7830e48eee7811be9527747de8', 'id': '7907c1028b94da63ef5c31b0d71f6afbf6d5294488d8bbf732fab89abded587f', 'severity': 'info'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "repositories_blacklist", "audience": "sysadmin", "detail": {"remediations": [{"context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "type": "hint"}]}, "groups": ["repository", "failure"], "hostname": "managed-node01", "id": "7907c1028b94da63ef5c31b0d71f6afbf6d5294488d8bbf732fab89abded587f", "key": "1b9132cb2362ae7830e48eee7811be9527747de8", "severity": "info", "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms", "timeStamp": "2025-12-17T20:30:31.291174Z", "title": "Excluded target system repositories"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['repository'], 'title': 'Packages available in excluded repositories will not be installed', 'timeStamp': '2025-12-17T20:30:33.446892Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'python3-pyxattr'}, {'scheme': 'package', 'title': 'rpcgen'}]}, 'actor': 'pes_events_scanner', 'summary': '2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled "Excluded target system repositories" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)', 'audience': 'sysadmin', 'key': '2437e204808f987477c0e9be8e4c95b3a87a9f3e', 'id': '80eb92ab09b52dddc2477333fb80ef366f0f3fc7fa0c3a03f1b2361eeeb6cb62', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "pes_events_scanner", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "python3-pyxattr"}, {"scheme": "package", "title": "rpcgen"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "80eb92ab09b52dddc2477333fb80ef366f0f3fc7fa0c3a03f1b2361eeeb6cb62", "key": "2437e204808f987477c0e9be8e4c95b3a87a9f3e", "severity": "high", "summary": "2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", "timeStamp": "2025-12-17T20:30:33.446892Z", "title": "Packages available in excluded repositories will not be installed"}, "skip_reason": "Conditional result was False"} ok: [managed-node01] => (item={'groups': ['kernel', 'drivers', 'inhibitor'], 'title': 'Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.', 'timeStamp': '2025-12-17T20:30:34.215904Z', 'hostname': 'managed-node01', 'detail': {'external': [{'url': 'https://access.redhat.com/solutions/6971716', 'title': 'Leapp preupgrade getting "Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed." '}, {'url': 'https://access.redhat.com/solutions/5436131', 'title': 'Leapp upgrade fail with error "Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."'}]}, 'actor': 'check_detected_devices_and_drivers', 'summary': 'Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n', 'audience': 'sysadmin', 'key': 'f08a07da902958defa4f5c2699fae9ec2eb67c5b', 'id': 'ad1384a8f596f5cd6ea4d16958410dde9e4a1d5e65ca33a263697c69e7e80f83', 'severity': 'high'}) => {"ansible_facts": {"leapp_inhibitors": [{"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "ad1384a8f596f5cd6ea4d16958410dde9e4a1d5e65ca33a263697c69e7e80f83", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-12-17T20:30:34.215904Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}], "upgrade_inhibited": true}, "ansible_loop_var": "item", "changed": false, "item": {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "ad1384a8f596f5cd6ea4d16958410dde9e4a1d5e65ca33a263697c69e7e80f83", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-12-17T20:30:34.215904Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}} skipping: [managed-node01] => (item={'groups': ['filesystem'], 'title': 'Detected broken systemd symlinks for non-existing services', 'timeStamp': '2025-12-17T20:30:34.408747Z', 'hostname': 'managed-node01', 'detail': {'remediations': [{'type': 'hint', 'context': 'Remove the invalid symlinks before the upgrade.'}, {'type': 'command', 'context': ['/usr/bin/rm', '/etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service']}]}, 'actor': 'check_systemd_broken_symlinks', 'summary': 'Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:\n - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service', 'audience': 'sysadmin', 'key': 'be2083fee03f5f0a708fd193d82d2fe20aee7217', 'id': '660ab36acf0a54e80f6fe1076704f07db724c3eac376f75d21a0611896e2a32e', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_systemd_broken_symlinks", "audience": "sysadmin", "detail": {"remediations": [{"context": "Remove the invalid symlinks before the upgrade.", "type": "hint"}, {"context": ["/usr/bin/rm", "/etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service"], "type": "command"}]}, "groups": ["filesystem"], "hostname": "managed-node01", "id": "660ab36acf0a54e80f6fe1076704f07db724c3eac376f75d21a0611896e2a32e", "key": "be2083fee03f5f0a708fd193d82d2fe20aee7217", "severity": "low", "summary": "Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:\n - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", "timeStamp": "2025-12-17T20:30:34.408747Z", "title": "Detected broken systemd symlinks for non-existing services"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['upgrade process', 'sanity'], 'title': 'Upgrade is unsupported', 'timeStamp': '2025-12-17T20:30:34.558376Z', 'hostname': 'managed-node01', 'actor': 'unsupported_upgrade_check', 'summary': 'Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.\n', 'audience': 'sysadmin', 'key': '9e5088e3c1f371e020ec777c3d86578f4be143cf', 'id': 'b264ef04e695982ec64e6f4eac24630d3caadb6eb18639e0bac3270c2dd8318f', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "unsupported_upgrade_check", "audience": "sysadmin", "groups": ["upgrade process", "sanity"], "hostname": "managed-node01", "id": "b264ef04e695982ec64e6f4eac24630d3caadb6eb18639e0bac3270c2dd8318f", "key": "9e5088e3c1f371e020ec777c3d86578f4be143cf", "severity": "high", "summary": "Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.\n", "timeStamp": "2025-12-17T20:30:34.558376Z", "title": "Upgrade is unsupported"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['repository'], 'title': 'Some enabled RPM repositories are unknown to Leapp', 'timeStamp': '2025-12-17T20:30:34.711173Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'libsolv'}, {'scheme': 'package', 'title': 'python-perf'}, {'scheme': 'package', 'title': 'kernel-tools-libs'}, {'scheme': 'package', 'title': 'libreport-filesystem'}, {'scheme': 'package', 'title': 'json-glib'}, {'scheme': 'package', 'title': 'librepo'}, {'scheme': 'package', 'title': 'kernel-tools'}, {'scheme': 'repository', 'title': 'rhel'}], 'remediations': [{'type': 'hint', 'context': 'You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket'}]}, 'actor': 'check_skipped_repositories', 'summary': 'The following repositories with Red Hat-signed packages are unknown to Leapp:\n- rhel\nAnd the following packages installed from those repositories may not be upgraded:\n- libsolv\n- python-perf\n- kernel-tools-libs\n- libreport-filesystem\n- json-glib\n- librepo\n- kernel-tools', 'audience': 'sysadmin', 'key': '8e89e20c645cea600b240156071d81c64daab7ad', 'id': '8f22ef4d17edac7f4cef866653aac7ef2ff150a7433b59c74bb08fa6c2f580c7', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_skipped_repositories", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "libsolv"}, {"scheme": "package", "title": "python-perf"}, {"scheme": "package", "title": "kernel-tools-libs"}, {"scheme": "package", "title": "libreport-filesystem"}, {"scheme": "package", "title": "json-glib"}, {"scheme": "package", "title": "librepo"}, {"scheme": "package", "title": "kernel-tools"}, {"scheme": "repository", "title": "rhel"}], "remediations": [{"context": "You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket", "type": "hint"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "8f22ef4d17edac7f4cef866653aac7ef2ff150a7433b59c74bb08fa6c2f580c7", "key": "8e89e20c645cea600b240156071d81c64daab7ad", "severity": "low", "summary": "The following repositories with Red Hat-signed packages are unknown to Leapp:\n- rhel\nAnd the following packages installed from those repositories may not be upgraded:\n- libsolv\n- python-perf\n- kernel-tools-libs\n- libreport-filesystem\n- json-glib\n- librepo\n- kernel-tools", "timeStamp": "2025-12-17T20:30:34.711173Z", "title": "Some enabled RPM repositories are unknown to Leapp"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['boot'], 'title': 'GRUB2 core will be automatically updated during the upgrade', 'timeStamp': '2025-12-17T20:30:34.898281Z', 'hostname': 'managed-node01', 'actor': 'check_grub_core', 'summary': 'On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running "grub2-install" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.', 'audience': 'sysadmin', 'key': 'ac7030e05d2ee248d34f08a9fa040b352bc410a3', 'id': '8fd5990c7250790c8d05e397ce91c38a07b1f9b5a279e428bdd0fde5f95e0944', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_grub_core", "audience": "sysadmin", "groups": ["boot"], "hostname": "managed-node01", "id": "8fd5990c7250790c8d05e397ce91c38a07b1f9b5a279e428bdd0fde5f95e0944", "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", "severity": "high", "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", "timeStamp": "2025-12-17T20:30:34.898281Z", "title": "GRUB2 core will be automatically updated during the upgrade"}, "skip_reason": "Conditional result was False"} ok: [managed-node01] => (item={'groups': ['filesystem', 'network', 'inhibitor'], 'title': "Use of NFS detected. Upgrade can't proceed", 'timeStamp': '2025-12-17T20:30:35.345678Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'file', 'title': '/etc/fstab'}], 'external': [{'url': 'https://access.redhat.com/solutions/6964006', 'title': 'Why does leapp upgrade fail on detecting NFS during upgrade?'}], 'remediations': [{'type': 'hint', 'context': 'Disable NFS temporarily for the upgrade if possible.'}]}, 'actor': 'check_nfs', 'summary': 'NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n', 'audience': 'sysadmin', 'key': '9881b25faceeeaa7a6478bcdac29afd7f6baaaed', 'id': 'de9851ec496751bac6de9b0065a70b34421f3eaff05277e8bf6b30edf2ae0a47', 'severity': 'high'}) => {"ansible_facts": {"leapp_inhibitors": [{"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "ad1384a8f596f5cd6ea4d16958410dde9e4a1d5e65ca33a263697c69e7e80f83", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-12-17T20:30:34.215904Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "de9851ec496751bac6de9b0065a70b34421f3eaff05277e8bf6b30edf2ae0a47", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2025-12-17T20:30:35.345678Z", "title": "Use of NFS detected. Upgrade can't proceed"}], "upgrade_inhibited": true}, "ansible_loop_var": "item", "changed": false, "item": {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "de9851ec496751bac6de9b0065a70b34421f3eaff05277e8bf6b30edf2ae0a47", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2025-12-17T20:30:35.345678Z", "title": "Use of NFS detected. Upgrade can't proceed"}} skipping: [managed-node01] => (item={'groups': ['python'], 'title': 'Difference in Python versions and support in RHEL 8', 'timeStamp': '2025-12-17T20:30:35.504957Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'python'}, {'scheme': 'package', 'title': 'python2'}, {'scheme': 'package', 'title': 'python3'}], 'external': [{'url': 'https://red.ht/rhel-8-python', 'title': 'Difference in Python versions and support in RHEL 8'}], 'remediations': [{'type': 'hint', 'context': 'Please run "alternatives --set python /usr/bin/python3" after upgrade'}]}, 'actor': 'python_inform_user', 'summary': "In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", 'audience': 'developer', 'key': '0c98585b1d8d252eb540bf61560094f3495351f5', 'id': '58fc3b82a0f26a9ce2222184f72ecdddc603555281328e7eb2360657225550e6', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "python_inform_user", "audience": "developer", "detail": {"external": [{"title": "Difference in Python versions and support in RHEL 8", "url": "https://red.ht/rhel-8-python"}], "related_resources": [{"scheme": "package", "title": "python"}, {"scheme": "package", "title": "python2"}, {"scheme": "package", "title": "python3"}], "remediations": [{"context": "Please run \"alternatives --set python /usr/bin/python3\" after upgrade", "type": "hint"}]}, "groups": ["python"], "hostname": "managed-node01", "id": "58fc3b82a0f26a9ce2222184f72ecdddc603555281328e7eb2360657225550e6", "key": "0c98585b1d8d252eb540bf61560094f3495351f5", "severity": "high", "summary": "In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", "timeStamp": "2025-12-17T20:30:35.504957Z", "title": "Difference in Python versions and support in RHEL 8"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['authentication', 'security', 'tools'], 'title': 'Module pam_pkcs11 will be removed from PAM configuration', 'timeStamp': '2025-12-17T20:30:35.926628Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'sssd'}], 'remediations': [{'type': 'hint', 'context': 'Configure SSSD to replace pam_pkcs11'}]}, 'actor': 'removed_pam_modules_check', 'summary': 'Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.', 'audience': 'sysadmin', 'key': 'bf47e7305d6805e8bbeaa7593cf01e38030c23f3', 'id': '61466ba489e9f0fbc678a84620e01e5907073304611c3962764996af9e9f657f', 'severity': 'medium'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "removed_pam_modules_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "sssd"}], "remediations": [{"context": "Configure SSSD to replace pam_pkcs11", "type": "hint"}]}, "groups": ["authentication", "security", "tools"], "hostname": "managed-node01", "id": "61466ba489e9f0fbc678a84620e01e5907073304611c3962764996af9e9f657f", "key": "bf47e7305d6805e8bbeaa7593cf01e38030c23f3", "severity": "medium", "summary": "Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.", "timeStamp": "2025-12-17T20:30:35.926628Z", "title": "Module pam_pkcs11 will be removed from PAM configuration"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['services', 'email'], 'title': 'Postfix has incompatible changes in the next major version', 'timeStamp': '2025-12-17T20:30:36.784875Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'postfix'}]}, 'actor': 'check_postfix', 'summary': 'Postfix 3.x has so called "compatibility safety net" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.\nThe backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.\nIt can be turned on by running: "postconf -e compatibility_level=0\nIt can be turned off by running: "postconf -e compatibility_level=2\n\nIn the Postfix MySQL database client, the default "option_group" value has changed to "client", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set "option_group" to the empty string.\n\nThe postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.\n\nPostfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to "auto", and introduces a new parameter "tls_eecdh_auto_curves" with the names of curves that may be negotiated.\n\nThe "master.cf" chroot default value has changed from "y" (yes) to "n" (no). This applies to master.cf services where chroot field is not explicitly specified.\n\nThe "append_dot_mydomain" default value has changed from "yes" to "no". You may need changing it to "yes" if senders cannot use complete domain names in e-mail addresses.\n\nThe "relay_domains" default value has changed from "$mydestination" to the empty value. This could result in unexpected "Relay access denied" errors or ETRN errors, because now will postfix by default relay only for the localhost.\n\nThe "mynetworks_style" default value has changed from "subnet" to "host". This parameter is used to implement the "permit_mynetworks" feature. The change could result in unexpected "access denied" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.\n\nPostfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.\n', 'audience': 'sysadmin', 'key': '5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33', 'id': '32f81ba683e5eb97933009c00adaf8de0582c338c8f10ddb409882dc9d931dc3', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_postfix", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "postfix"}]}, "groups": ["services", "email"], "hostname": "managed-node01", "id": "32f81ba683e5eb97933009c00adaf8de0582c338c8f10ddb409882dc9d931dc3", "key": "5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33", "severity": "low", "summary": "Postfix 3.x has so called \"compatibility safety net\" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.\nThe backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.\nIt can be turned on by running: \"postconf -e compatibility_level=0\nIt can be turned off by running: \"postconf -e compatibility_level=2\n\nIn the Postfix MySQL database client, the default \"option_group\" value has changed to \"client\", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set \"option_group\" to the empty string.\n\nThe postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.\n\nPostfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to \"auto\", and introduces a new parameter \"tls_eecdh_auto_curves\" with the names of curves that may be negotiated.\n\nThe \"master.cf\" chroot default value has changed from \"y\" (yes) to \"n\" (no). This applies to master.cf services where chroot field is not explicitly specified.\n\nThe \"append_dot_mydomain\" default value has changed from \"yes\" to \"no\". You may need changing it to \"yes\" if senders cannot use complete domain names in e-mail addresses.\n\nThe \"relay_domains\" default value has changed from \"$mydestination\" to the empty value. This could result in unexpected \"Relay access denied\" errors or ETRN errors, because now will postfix by default relay only for the localhost.\n\nThe \"mynetworks_style\" default value has changed from \"subnet\" to \"host\". This parameter is used to implement the \"permit_mynetworks\" feature. The change could result in unexpected \"access denied\" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.\n\nPostfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.\n", "timeStamp": "2025-12-17T20:30:36.784875Z", "title": "Postfix has incompatible changes in the next major version"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['services', 'time management'], 'title': 'chrony using default configuration', 'timeStamp': '2025-12-17T20:30:37.310655Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'ntpd'}, {'scheme': 'package', 'title': 'chrony'}, {'scheme': 'file', 'title': '/etc/chrony.conf'}]}, 'actor': 'check_chrony', 'summary': 'default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives', 'audience': 'sysadmin', 'key': 'c4222ebd18730a76f6bc7b3b66df898b106e6554', 'id': '10296b29943bc119f732c818e068094a9d87a1d9ab6d5922ea10d6c289151e3b', 'severity': 'medium'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_chrony", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "ntpd"}, {"scheme": "package", "title": "chrony"}, {"scheme": "file", "title": "/etc/chrony.conf"}]}, "groups": ["services", "time management"], "hostname": "managed-node01", "id": "10296b29943bc119f732c818e068094a9d87a1d9ab6d5922ea10d6c289151e3b", "key": "c4222ebd18730a76f6bc7b3b66df898b106e6554", "severity": "medium", "summary": "default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives", "timeStamp": "2025-12-17T20:30:37.310655Z", "title": "chrony using default configuration"}, "skip_reason": "Conditional result was False"} ok: [managed-node01] => (item={'groups': ['filesystem', 'network', 'inhibitor'], 'title': "Use of CIFS detected. Upgrade can't proceed", 'timeStamp': '2025-12-17T20:30:37.583778Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'file', 'title': '/etc/fstab'}], 'external': [{'url': 'https://access.redhat.com/solutions/6964304', 'title': 'Leapp upgrade failed with error "Inhibitor: Use of CIFS detected. Upgrade cannot proceed"'}], 'remediations': [{'type': 'hint', 'context': 'Comment out CIFS entries to proceed with the upgrade.'}]}, 'actor': 'check_cifs', 'summary': 'CIFS is currently not supported by the inplace upgrade.', 'audience': 'sysadmin', 'key': 'd0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a', 'id': '383ed1d8ddea078f8852cef39692d29113338007ca4fc5400e131ce473200210', 'severity': 'high'}) => {"ansible_facts": {"leapp_inhibitors": [{"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "ad1384a8f596f5cd6ea4d16958410dde9e4a1d5e65ca33a263697c69e7e80f83", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-12-17T20:30:34.215904Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "de9851ec496751bac6de9b0065a70b34421f3eaff05277e8bf6b30edf2ae0a47", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2025-12-17T20:30:35.345678Z", "title": "Use of NFS detected. Upgrade can't proceed"}, {"actor": "check_cifs", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "383ed1d8ddea078f8852cef39692d29113338007ca4fc5400e131ce473200210", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2025-12-17T20:30:37.583778Z", "title": "Use of CIFS detected. Upgrade can't proceed"}], "upgrade_inhibited": true}, "ansible_loop_var": "item", "changed": false, "item": {"actor": "check_cifs", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "383ed1d8ddea078f8852cef39692d29113338007ca4fc5400e131ce473200210", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2025-12-17T20:30:37.583778Z", "title": "Use of CIFS detected. Upgrade can't proceed"}} skipping: [managed-node01] => (item={'groups': ['authentication', 'security', 'tools'], 'title': 'Current PAM and nsswitch.conf configuration will be kept.', 'timeStamp': '2025-12-17T20:30:37.626560Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'authselect'}, {'scheme': 'package', 'title': 'authconfig'}, {'scheme': 'file', 'title': '/etc/nsswitch.conf'}]}, 'actor': 'authselect_check', 'summary': 'There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.', 'audience': 'sysadmin', 'key': '40c4ab1da4a30dc1ca40e543f6385e1336d8810c', 'id': '5ca7905c765b9d764518a5ac59f7683675a4d899047255e4a0f2cffa95ce89c5', 'severity': 'info'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "authselect_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "authselect"}, {"scheme": "package", "title": "authconfig"}, {"scheme": "file", "title": "/etc/nsswitch.conf"}]}, "groups": ["authentication", "security", "tools"], "hostname": "managed-node01", "id": "5ca7905c765b9d764518a5ac59f7683675a4d899047255e4a0f2cffa95ce89c5", "key": "40c4ab1da4a30dc1ca40e543f6385e1336d8810c", "severity": "info", "summary": "There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.", "timeStamp": "2025-12-17T20:30:37.626560Z", "title": "Current PAM and nsswitch.conf configuration will be kept."}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['tools'], 'title': 'Grep has incompatible changes in the next major version', 'timeStamp': '2025-12-17T20:30:37.746124Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'grep'}], 'remediations': [{'type': 'hint', 'context': 'Please update your scripts to be compatible with the changes.'}]}, 'actor': 'checkgrep', 'summary': 'If a file contains data improperly encoded for the current locale, and this is discovered before any of the file\'s contents are output, grep now treats the file as binary.\nThe \'grep -P\' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.\nIn locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.\nWhen searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.\nThe \'grep -z\' no longer automatically treats the byte \'\\200\' as binary data.\nContext no longer excludes selected lines omitted because of -m. For example, \'grep "^" -m1 -A1\' now outputs the first two input lines, not just the first line.\n', 'audience': 'sysadmin', 'key': '94665a499e2eeee35eca3e7093a7abe183384b16', 'id': '13f2dbe811b055760849df5051947ae3dd8961e12c770933b7f79836dce92d0a', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "checkgrep", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "grep"}], "remediations": [{"context": "Please update your scripts to be compatible with the changes.", "type": "hint"}]}, "groups": ["tools"], "hostname": "managed-node01", "id": "13f2dbe811b055760849df5051947ae3dd8961e12c770933b7f79836dce92d0a", "key": "94665a499e2eeee35eca3e7093a7abe183384b16", "severity": "low", "summary": "If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.\nThe 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.\nIn locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.\nWhen searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.\nThe 'grep -z' no longer automatically treats the byte '\\200' as binary data.\nContext no longer excludes selected lines omitted because of -m. For example, 'grep \"^\" -m1 -A1' now outputs the first two input lines, not just the first line.\n", "timeStamp": "2025-12-17T20:30:37.746124Z", "title": "Grep has incompatible changes in the next major version"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['selinux', 'security'], 'title': 'SElinux relabeling will be scheduled', 'timeStamp': '2025-12-17T20:30:38.346479Z', 'hostname': 'managed-node01', 'actor': 'check_se_linux', 'summary': 'SElinux relabeling will be scheduled as the status is permissive/enforcing.', 'audience': 'sysadmin', 'key': '8fb81863f8413bd617c2a55b69b8e10ff03d7c72', 'id': 'eda897d2cc54c61b4805fb8d03518931960bc57dc545ec81c4c1f7185e89576a', 'severity': 'info'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_se_linux", "audience": "sysadmin", "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "eda897d2cc54c61b4805fb8d03518931960bc57dc545ec81c4c1f7185e89576a", "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", "severity": "info", "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", "timeStamp": "2025-12-17T20:30:38.346479Z", "title": "SElinux relabeling will be scheduled"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['selinux', 'security'], 'title': 'SElinux will be set to permissive mode', 'timeStamp': '2025-12-17T20:30:38.350404Z', 'hostname': 'managed-node01', 'detail': {'remediations': [{'type': 'hint', 'context': 'Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the "/root/tmp_leapp_py3" SElinux warnings.'}]}, 'actor': 'check_se_linux', 'summary': 'SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.', 'audience': 'sysadmin', 'key': '39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f', 'id': '4311d4c4c504cc57a3ebe89fcee6acb25415555f703420db72b791d7d18f69e2', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_se_linux", "audience": "sysadmin", "detail": {"remediations": [{"context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.", "type": "hint"}]}, "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "4311d4c4c504cc57a3ebe89fcee6acb25415555f703420db72b791d7d18f69e2", "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", "severity": "low", "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", "timeStamp": "2025-12-17T20:30:38.350404Z", "title": "SElinux will be set to permissive mode"}, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : parse_leapp_report | Collect inhibitors] ************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:44 ok: [managed-node01] => {"changed": false, "cmd": ["awk", "/\\(inhibitor\\)/,/^-------/", "/var/log/leapp/leapp-report.txt"], "delta": "0:00:00.004297", "end": "2025-12-17 15:31:01.872627", "failed_when_result": false, "msg": "", "rc": 0, "start": "2025-12-17 15:31:01.868330", "stderr": "", "stderr_lines": [], "stdout": "Risk Factor: high (inhibitor)\nTitle: Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\nSummary: Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n\nRelated links:\n - Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" : https://access.redhat.com/solutions/6971716\n - Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\": https://access.redhat.com/solutions/5436131\nKey: f08a07da902958defa4f5c2699fae9ec2eb67c5b\n----------------------------------------\nRisk Factor: high (inhibitor)\nTitle: Use of NFS detected. Upgrade can't proceed\nSummary: NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n\nRelated links:\n - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006\nRemediation: [hint] Disable NFS temporarily for the upgrade if possible.\nKey: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed\n----------------------------------------\nRisk Factor: high (inhibitor)\nTitle: Use of CIFS detected. Upgrade can't proceed\nSummary: CIFS is currently not supported by the inplace upgrade.\nRelated links:\n - Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\": https://access.redhat.com/solutions/6964304\nRemediation: [hint] Comment out CIFS entries to proceed with the upgrade.\nKey: d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a\n----------------------------------------", "stdout_lines": ["Risk Factor: high (inhibitor)", "Title: Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", "Summary: Support for the following RHEL 7 device drivers has been removed in RHEL 8:", " - pata_acpi", "", "Related links:", " - Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" : https://access.redhat.com/solutions/6971716", " - Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\": https://access.redhat.com/solutions/5436131", "Key: f08a07da902958defa4f5c2699fae9ec2eb67c5b", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Use of NFS detected. Upgrade can't proceed", "Summary: NFS is currently not supported by the inplace upgrade.", "We have found NFS usage at the following locations:", "- NFS shares found in /etc/fstab:", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat", " - nest.test.redhat.com:/mnt/qa /mnt/qa", " - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive", " - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch", "", "Related links:", " - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006", "Remediation: [hint] Disable NFS temporarily for the upgrade if possible.", "Key: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Use of CIFS detected. Upgrade can't proceed", "Summary: CIFS is currently not supported by the inplace upgrade.", "Related links:", " - Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\": https://access.redhat.com/solutions/6964304", "Remediation: [hint] Comment out CIFS entries to proceed with the upgrade.", "Key: d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "----------------------------------------"]} TASK [infra.leapp.common : parse_leapp_report | Collect high errors] *********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:53 ok: [managed-node01] => {"changed": false, "cmd": ["awk", "/high \\(error\\)/,/^-------/", "/var/log/leapp/leapp-report.txt"], "delta": "0:00:00.003627", "end": "2025-12-17 15:31:02.160751", "failed_when_result": false, "msg": "", "rc": 0, "start": "2025-12-17 15:31:02.157124", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} TASK [infra.leapp.analysis : Set stats for leapp_inhibitors] ******************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:17 ok: [managed-node01] => {"ansible_stats": {"aggregate": true, "data": {"leapp_inhibitors": [{"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "ad1384a8f596f5cd6ea4d16958410dde9e4a1d5e65ca33a263697c69e7e80f83", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-12-17T20:30:34.215904Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "de9851ec496751bac6de9b0065a70b34421f3eaff05277e8bf6b30edf2ae0a47", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2025-12-17T20:30:35.345678Z", "title": "Use of NFS detected. Upgrade can't proceed"}, {"actor": "check_cifs", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "383ed1d8ddea078f8852cef39692d29113338007ca4fc5400e131ce473200210", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2025-12-17T20:30:37.583778Z", "title": "Use of CIFS detected. Upgrade can't proceed"}]}, "per_host": false}, "changed": false} TASK [infra.leapp.analysis : Notify analysis report is done handler] *********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:22 NOTIFIED HANDLER infra.leapp.analysis : Preupgrade analysis report is done for managed-node01 NOTIFIED HANDLER infra.leapp.analysis : Display inhibitors for managed-node01 NOTIFIED HANDLER infra.leapp.analysis : Display errors for managed-node01 changed: [managed-node01] => {"changed": true, "msg": "All assertions passed"} TASK [common_upgrade_tasks | Flush handlers] *********************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:25 META: triggered running handlers for managed-node01 RUNNING HANDLER [infra.leapp.common : Check for log file] ********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:3 ok: [managed-node01] => {"changed": false, "stat": {"atime": 1766003387.0643072, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 40, "charset": "us-ascii", "checksum": "cad1eb5470ee3a2f4ce69f7dac5f83961a65ed0d", "ctime": 1766003438.711267, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 427819122, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1766003438.711267, "nlink": 1, "path": "/var/log/ripu/ripu.log", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 18197, "uid": 0, "version": "1849336985", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} RUNNING HANDLER [infra.leapp.common : Add end time to log file] **************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:9 changed: [managed-node01] => {"backup": "", "changed": true, "msg": "line added"} RUNNING HANDLER [infra.leapp.common : Slurp ripu.log file] ********************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:19 ok: [managed-node01] => {"changed": false, "content": "RIPU preupgrade analysis
Job started at 2025-12-17T20:29:46Z

============================================================
                    UNSUPPORTED UPGRADE                     
============================================================

Variable LEAPP_UNSUPPORTED has been detected. Proceeding at your own risk.
Development variables have been detected:
- LEAPP_DEVEL_RPMS_ALL_SIGNED=1

============================================================
                    UNSUPPORTED UPGRADE                     
============================================================

==> Processing phase `configuration_phase`
====> * ipu_workflow_config
        IPU workflow config actor
==> Processing phase `FactsCollection`
====> * get_enabled_modules
        Provides data about which module streams are enabled on the source system.
====> * system_facts
        Provides data about many facts from system.
====> * source_boot_loader_scanner
        Scans the boot loader configuration on the source system.
====> * authselect_scanner
        Detect what authselect configuration should be suggested to administrator.
====> * udevadm_info
        Produces data exported by the "udevadm info" command.
====> * repository_mapping
        Produces message containing repository mapping based on provided file.
====> * pam_modules_scanner
        Scan the pam directory for services and modules used in them
====> * root_scanner
        Scan the system root directory and produce a message containing
====> * scan_kernel_cmdline
        No documentation has been provided for the scan_kernel_cmdline actor.
====> * scan_systemd_source
        Provides info about systemd on the source system
====> * rpm_scanner
        Provides data about installed RPM Packages.
Loaded plugins: product-id, subscription-manager

This system is not registered with an entitlement server. You can use subscription-manager to register.

====> * transaction_workarounds
        Provides additional RPM transaction tasks based on bundled RPM packages.
====> * scan_grub_config
        Scan grub configuration files for errors.
====> * scan_grub_device_name
        Find the name of the block devices where GRUB is located
====> * sctp_read_status
        Determines whether or not the SCTP kernel module might be wanted.
====> * tcp_wrappers_config_read
        Parse tcp_wrappers configuration files /etc/hosts.{allow,deny}.
====> * scan_custom_modifications_actor
        Collects information about files in leapp directories that have been modified or newly added.
====> * scan_files_for_target_userspace
        Scan the source system and identify files that will be copied into the target userspace when it is created.
====> * register_yum_adjustment
        Registers a workaround which will adjust the yum directories during the upgrade.
====> * scan_custom_repofile
        Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.
====> * load_device_driver_deprecation_data
        Loads deprecation data for drivers and devices (PCI & CPU)
====> * trusted_gpg_keys_scanner
        Scan for trusted GPG keys.
====> * removed_pam_modules_scanner
        Scan PAM configuration for modules that are not available in RHEL-8.
====> * scanzfcp
        In case of s390x architecture, check whether ZFCP is used.
====> * scanclienablerepo
        Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.
====> * read_openssh_config
        Collect information about the OpenSSH configuration.
====> * common_leapp_dracut_modules
        Influences the generation of the initram disk
====> * scan_fips
        Determine whether the source system has FIPS enabled.
====> * storage_scanner
        Provides data about storage settings.
====> * detect_kernel_drivers
        Matches all currently loaded kernel drivers against known deprecated and removed drivers.
====> * sssd_facts
        Check SSSD configuration for changes in RHEL8 and report them in model.
====> * copy_dnf_conf_into_target_userspace
        Copy dnf.conf into target userspace
====> * firewalld_facts_actor
        Provide data about firewalld
====> * selinuxcontentscanner
        Scan the system for any SELinux customizations
====> * distribution_signed_rpm_scanner
        Provide data about distribution signed & unsigned RPM packages.
====> * scan_grub_device_partition_layout
        Scan all identified GRUB devices for their partition layout.
====> * check_grub_legacy
        Check whether GRUB Legacy is installed in the MBR.
====> * scandasd
        In case of s390x architecture, check whether DASD is used.
====> * scanmemory
        Scan Memory of the machine.
====> * scan_subscription_manager_info
        Scans the current system for subscription manager information
====> * satellite_upgrade_facts
        Report which Satellite packages require updates and how to handle PostgreSQL data
====> * cups_scanner
        Gather facts about CUPS features which needs to be migrated
====> * pci_devices_scanner
        Provides data about existing PCI Devices.
====> * scan_pkg_manager
        Provides data about package manager (yum/dnf)
====> * checkrhui
        Check if system is using RHUI infrastructure (on public cloud) and send messages to
====> * scan_sap_hana
        Gathers information related to SAP HANA instances on the system.
====> * network_manager_read_config
        Provides data about NetworkManager configuration.
====> * scan_source_files
        Scan files (explicitly specified) of the source system.
====> * scan_source_kernel
        Scan the source system kernel.
====> * scan_target_os_image
        Scans the provided target OS ISO image to use as a content source for the IPU, if any.
====> * remove_obsolete_gpg_keys
        Remove obsoleted RPM GPG keys.
====> * multipath_conf_read
        Read multipath configuration files and extract the necessary information
====> * persistentnetnames
        Get network interface information for physical ethernet interfaces of the original system.
====> * quagga_daemons
        Active quagga daemons check.
====> * get_installed_desktops
        Actor checks if kde or gnome desktop environments
====> * scancpu
        Scan CPUs of the machine.
====> * check_kde_apps
        Actor checks which KDE apps are installed.
====> * repositories_blacklist
        Exclude target repositories provided by Red Hat without support.
====> * biosdevname
        Enable biosdevname on the target RHEL system if all interfaces on the source RHEL
====> * rpm_transaction_config_tasks_collector
        Provides additional RPM transaction tasks from /etc/leapp/transaction.
====> * ipa_scanner
        Scan system for ipa-client and ipa-server status
====> * spamassassin_config_read
        Reads spamc configuration (/etc/mail/spamassassin/spamc.conf), the
====> * vsftpd_config_read
        Reads vsftpd configuration files (/etc/vsftpd/*.conf) and extracts necessary information.
====> * scan_dynamic_linker_configuration
        Scan the dynamic linker configuration and find modifications.
====> * xfs_info_scanner
        This actor scans all mounted mountpoints for XFS information
====> * used_repository_scanner
        Scan used enabled repositories
====> * persistentnetnamesdisable
        Disable systemd-udevd persistent network naming on machine with single eth0 NIC
====> * pes_events_scanner
        Provides data about package events from Package Evolution Service.
====> * setuptargetrepos
        Produces list of repositories that should be available to be used by Upgrade process.
==> Processing phase `Checks`
====> * open_ssh_algorithms
        OpenSSH configuration does not contain any unsupported cryptographic algorithms.
====> * checktargetrepos
        Check whether target yum repositories are specified.
====> * satellite_upgrade_check
        Check state of Satellite system before upgrade
====> * checkirssi
        Check if irssi is installed. If yes, write information about non-compatible changes.
====> * check_os_release
        Check if the current RHEL minor version is supported. If not, inhibit the upgrade process.
====> * zipl_check_boot_entries
        Inhibits the upgrade if a problematic Zipl configuration is detected on the system.
====> * check_btrfs
        Check if Btrfs filesystem is in use. If yes, inhibit the upgrade process.
====> * check_boot_avail_space
        Check if at least 100Mib of available space on /boot. If not, inhibit the upgrade process.
====> * check_wireshark
        Report a couple of changes in tshark usage
====> * sssd_check
        Check SSSD configuration for changes in RHEL8 and report them.
====> * check_sap_hana
        If SAP HANA has been detected, several checks are performed to ensure a successful upgrade.
====> * check_detected_devices_and_drivers
        Checks whether or not detected devices and drivers are usable on the target system.
====> * check_root_symlinks
        Check if the symlinks /bin and /lib are relative, not absolute.
====> * open_ssh_deprecated_directives_check
        Check for any deprecated directives in the OpenSSH configuration.
====> * cups_check
        Reports changes in configuration between CUPS 1.6.3 and 2.2.6
====> * check_ipa_server
        Check for ipa-server and inhibit upgrade
====> * check_systemd_broken_symlinks
        Check whether some systemd symlinks are broken
====> * check_mount_options
        Check for mount options preventing the upgrade.
====> * check_system_arch
        Check if system is running at a supported architecture. If no, inhibit the upgrade process.
====> * spamassassin_config_check
        Reports changes in spamassassin between RHEL-7 and RHEL-8
====> * unsupported_upgrade_check
        Checks environment variables and produces a warning report if the upgrade is unsupported.
====> * cephvolumescan
        Retrieves the list of encrypted Ceph OSD
====> * check_installed_devel_kernels
        Inhibit IPU (in-place upgrade) when multiple devel kernels are installed.
====> * check_skipped_repositories
        Produces a report if any repositories enabled on the system are going to be skipped.
====> * multiple_package_versions
        Check for problematic 32bit packages installed together with 64bit ones.
====> * check_grub_core
        Check whether we are on legacy (BIOS) system and instruct Leapp to upgrade GRUB core
====> * check_consumed_assets
        Check whether Leapp is using correct data assets.
====> * powertop
        Check if PowerTOP is installed. If yes, write information about non-compatible changes.
====> * check_yum_plugins_enabled
        Checks that the required yum plugins are enabled.
====> * sctp_checks
        Parses collected SCTP information and take necessary actions.
====> * bacula_check
        Actor checking for presence of Bacula installation.
====> * quagga_report
        Checking for babeld on RHEL-7.
====> * check_nfs
        Check if NFS filesystem is in use. If yes, inhibit the upgrade process.
====> * check_brltty
        Check if brltty is installed, check whether configuration update is needed.
====> * check_target_iso
        Check that the provided target ISO is a valid ISO image and is located on a persistent partition.
====> * python_inform_user
        This actor informs the user of differences in Python version and support in RHEL 8.
====> * check_rhsmsku
        Ensure the system is subscribed to the subscription manager
====> * check_insights_auto_register
        Checks if system can be automatically registered into Red Hat Insights
====> * tcp_wrappers_check
        Check the list of packages previously compiled with TCP wrappers support
====> * check_etc_releasever
        Check releasever info and provide a guidance based on the facts
====> * removed_pam_modules_check
        Check if it is all right to disable PAM modules that are not in RHEL-8.
====> * check_openssl_conf
        Check whether the openssl configuration and openssl-IBMCA.
====> * check_sendmail
        Check if sendmail is installed, check whether configuration update is needed, inhibit upgrade if TCP wrappers
====> * open_ssh_use_privilege_separation
        UsePrivilegeSeparation configuration option was removed.
====> * check_memcached
        Check for incompatible changes in memcached configuration.
====> * check_fips
        Inhibit upgrade if FIPS is detected as enabled.
====> * check_installed_debug_kernels
        Inhibit IPU (in-place upgrade) when multiple debug kernels are installed.
====> * check_docker
        Checks if Docker is installed and warns about its deprecation in RHEL8.
====> * check_custom_modifications_actor
        Checks CustomModifications messages and produces a report about files in leapp directories that have been
====> * check_ntp
        Check if ntp and/or ntpdate configuration needs to be migrated.
====> * openssh_permit_root_login
        OpenSSH no longer allows root logins with password.
====> * multipath_conf_check
        Checks whether the multipath configuration can be updated to RHEL-8 and
====> * checkmemory
        The actor check the size of RAM against RHEL8 minimal hardware requirements
====> * enable_device_cio_free_service
        Enables device_cio_free.service systemd service on s390x
====> * check_bind
        Actor parsing BIND configuration and checking for known issues in it.
====> * check_postfix
        Check if postfix is installed, check whether configuration update is needed.
====> * check_fstab_mount_order
        Checks order of entries in /etc/fstab based on their mount point and inhibits upgrade if overshadowing is detected.
====> * checkhybridimage
        Check if the system is using Azure hybrid image.
====> * check_installed_kernels
        Inhibit IPU (in-place upgrade) when installed kernels conflict with a safe upgrade.
====> * checkfstabxfsoptions
        Check the FSTAB file for the deprecated / removed XFS mount options.
====> * removed_pam_modules
        Check for modules that are not available in RHEL 8 anymore
====> * check_chrony
        Check for incompatible changes in chrony configuration.
====> * checkdosfstools
        Check if dosfstools is installed. If yes, write information about non-compatible changes.
====> * open_ssh_protocol
        Protocol configuration option was removed.
====> * checkacpid
        Check if acpid is installed. If yes, write information about non-compatible changes.
====> * check_ha_cluster
        Check if HA Cluster is in use. If yes, inhibit the upgrade process.
====> * check_cifs
        Check if CIFS filesystem is in use. If yes, inhibit the upgrade process.
====> * authselect_check
        Confirm suggested authselect call from AuthselectScanner.
====> * check_luks_and_inhibit
        Check if any encrypted partitions is in use. If yes, inhibit the upgrade process.
====> * checkgrep
        Check if Grep is installed. If yes, write information about non-compatible changes.
====> * check_dynamic_linker_configuration
        Check for customization of dynamic linker configuration.
====> * check_rpm_transaction_events
        Filter RPM transaction events based on installed RPM packages
====> * postgresql_check
        Actor checking for presence of PostgreSQL installation.
====> * efi_check_boot
        Adjust EFI boot entry for first reboot
====> * check_kde_gnome
        Checks whether KDE is installed
====> * check_first_partition_offset
        Check whether the first partition starts at the offset >=1MiB.
====> * check_removed_envvars
        Check for usage of removed environment variables and inhibit the upgrade
====> * vsftpd_config_check
        Checks whether the vsftpd configuration is supported in RHEL-8. Namely checks that
====> * red_hat_signed_rpm_check
        Check if there are packages not signed by Red Hat in use. If yes, warn user about it.
====> * check_firewalld
        Check for certain firewalld configuration that may prevent an upgrade.
====> * check_persistent_mounts
        Check if mounts required to be persistent are mounted in persistent fashion.
====> * detect_grub_config_error
        Check grub configuration for various errors.
====> * check_se_linux
        Check SELinux status and produce decision messages for further action.
====> * check_skip_phase
        Skip all the subsequent phases until the report phase.
==> Processing phase `Reports`
====> * verify_check_results
        Check all dialogs and notify that user needs to make some choices.
====> * verify_check_results
        Check all generated results messages and notify user about them.

Debug output written to /var/log/leapp/leapp-preupgrade.log

============================================================
                      REPORT OVERVIEW                       
============================================================

Upgrade has been inhibited due to the following problems:
    1. Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.
    2. Use of NFS detected. Upgrade can't proceed
    3. Use of CIFS detected. Upgrade can't proceed

HIGH and MEDIUM severity reports:
    1. Packages available in excluded repositories will not be installed
    2. Upgrade is unsupported
    3. GRUB2 core will be automatically updated during the upgrade
    4. Difference in Python versions and support in RHEL 8
    5. Module pam_pkcs11 will be removed from PAM configuration
    6. chrony using default configuration

Reports summary:
    Errors:                      0
    Inhibitors:                  3
    HIGH severity reports:       4
    MEDIUM severity reports:     2
    LOW severity reports:        5
    INFO severity reports:       3

Before continuing, review the full report below for details about discovered problems and possible remediation instructions:
    A report has been generated at /var/log/leapp/leapp-report.txt
    A report has been generated at /var/log/leapp/leapp-report.json

============================================================
                   END OF REPORT OVERVIEW                   
============================================================

Answerfile has been generated at /var/log/leapp/answerfile
Job ended at 2025-12-17T20:31:02Z
", "encoding": "base64", "source": "/var/log/ripu/ripu.log"} RUNNING HANDLER [infra.leapp.common : Decode ripu.log file] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:26 ok: [managed-node01] => {"ansible_facts": {"ripu_log_file": ["RIPU preupgrade analysis", "Job started at 2025-12-17T20:29:46Z", "", "============================================================", " UNSUPPORTED UPGRADE ", "============================================================", "", "Variable LEAPP_UNSUPPORTED has been detected. Proceeding at your own risk.", "Development variables have been detected:", "- LEAPP_DEVEL_RPMS_ALL_SIGNED=1", "", "============================================================", " UNSUPPORTED UPGRADE ", "============================================================", "", "==> Processing phase `configuration_phase`", "====> * ipu_workflow_config", " IPU workflow config actor", "==> Processing phase `FactsCollection`", "====> * get_enabled_modules", " Provides data about which module streams are enabled on the source system.", "====> * system_facts", " Provides data about many facts from system.", "====> * source_boot_loader_scanner", " Scans the boot loader configuration on the source system.", "====> * authselect_scanner", " Detect what authselect configuration should be suggested to administrator.", "====> * udevadm_info", " Produces data exported by the \"udevadm info\" command.", "====> * repository_mapping", " Produces message containing repository mapping based on provided file.", "====> * pam_modules_scanner", " Scan the pam directory for services and modules used in them", "====> * root_scanner", " Scan the system root directory and produce a message containing", "====> * scan_kernel_cmdline", " No documentation has been provided for the scan_kernel_cmdline actor.", "====> * scan_systemd_source", " Provides info about systemd on the source system", "====> * rpm_scanner", " Provides data about installed RPM Packages.", "Loaded plugins: product-id, subscription-manager", "", "This system is not registered with an entitlement server. You can use subscription-manager to register.", "", "====> * transaction_workarounds", " Provides additional RPM transaction tasks based on bundled RPM packages.", "====> * scan_grub_config", " Scan grub configuration files for errors.", "====> * scan_grub_device_name", " Find the name of the block devices where GRUB is located", "====> * sctp_read_status", " Determines whether or not the SCTP kernel module might be wanted.", "====> * tcp_wrappers_config_read", " Parse tcp_wrappers configuration files /etc/hosts.{allow,deny}.", "====> * scan_custom_modifications_actor", " Collects information about files in leapp directories that have been modified or newly added.", "====> * scan_files_for_target_userspace", " Scan the source system and identify files that will be copied into the target userspace when it is created.", "====> * register_yum_adjustment", " Registers a workaround which will adjust the yum directories during the upgrade.", "====> * scan_custom_repofile", " Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.", "====> * load_device_driver_deprecation_data", " Loads deprecation data for drivers and devices (PCI & CPU)", "====> * trusted_gpg_keys_scanner", " Scan for trusted GPG keys.", "====> * removed_pam_modules_scanner", " Scan PAM configuration for modules that are not available in RHEL-8.", "====> * scanzfcp", " In case of s390x architecture, check whether ZFCP is used.", "====> * scanclienablerepo", " Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.", "====> * read_openssh_config", " Collect information about the OpenSSH configuration.", "====> * common_leapp_dracut_modules", " Influences the generation of the initram disk", "====> * scan_fips", " Determine whether the source system has FIPS enabled.", "====> * storage_scanner", " Provides data about storage settings.", "====> * detect_kernel_drivers", " Matches all currently loaded kernel drivers against known deprecated and removed drivers.", "====> * sssd_facts", " Check SSSD configuration for changes in RHEL8 and report them in model.", "====> * copy_dnf_conf_into_target_userspace", " Copy dnf.conf into target userspace", "====> * firewalld_facts_actor", " Provide data about firewalld", "====> * selinuxcontentscanner", " Scan the system for any SELinux customizations", "====> * distribution_signed_rpm_scanner", " Provide data about distribution signed & unsigned RPM packages.", "====> * scan_grub_device_partition_layout", " Scan all identified GRUB devices for their partition layout.", "====> * check_grub_legacy", " Check whether GRUB Legacy is installed in the MBR.", "====> * scandasd", " In case of s390x architecture, check whether DASD is used.", "====> * scanmemory", " Scan Memory of the machine.", "====> * scan_subscription_manager_info", " Scans the current system for subscription manager information", "====> * satellite_upgrade_facts", " Report which Satellite packages require updates and how to handle PostgreSQL data", "====> * cups_scanner", " Gather facts about CUPS features which needs to be migrated", "====> * pci_devices_scanner", " Provides data about existing PCI Devices.", "====> * scan_pkg_manager", " Provides data about package manager (yum/dnf)", "====> * checkrhui", " Check if system is using RHUI infrastructure (on public cloud) and send messages to", "====> * scan_sap_hana", " Gathers information related to SAP HANA instances on the system.", "====> * network_manager_read_config", " Provides data about NetworkManager configuration.", "====> * scan_source_files", " Scan files (explicitly specified) of the source system.", "====> * scan_source_kernel", " Scan the source system kernel.", "====> * scan_target_os_image", " Scans the provided target OS ISO image to use as a content source for the IPU, if any.", "====> * remove_obsolete_gpg_keys", " Remove obsoleted RPM GPG keys.", "====> * multipath_conf_read", " Read multipath configuration files and extract the necessary information", "====> * persistentnetnames", " Get network interface information for physical ethernet interfaces of the original system.", "====> * quagga_daemons", " Active quagga daemons check.", "====> * get_installed_desktops", " Actor checks if kde or gnome desktop environments", "====> * scancpu", " Scan CPUs of the machine.", "====> * check_kde_apps", " Actor checks which KDE apps are installed.", "====> * repositories_blacklist", " Exclude target repositories provided by Red Hat without support.", "====> * biosdevname", " Enable biosdevname on the target RHEL system if all interfaces on the source RHEL", "====> * rpm_transaction_config_tasks_collector", " Provides additional RPM transaction tasks from /etc/leapp/transaction.", "====> * ipa_scanner", " Scan system for ipa-client and ipa-server status", "====> * spamassassin_config_read", " Reads spamc configuration (/etc/mail/spamassassin/spamc.conf), the", "====> * vsftpd_config_read", " Reads vsftpd configuration files (/etc/vsftpd/*.conf) and extracts necessary information.", "====> * scan_dynamic_linker_configuration", " Scan the dynamic linker configuration and find modifications.", "====> * xfs_info_scanner", " This actor scans all mounted mountpoints for XFS information", "====> * used_repository_scanner", " Scan used enabled repositories", "====> * persistentnetnamesdisable", " Disable systemd-udevd persistent network naming on machine with single eth0 NIC", "====> * pes_events_scanner", " Provides data about package events from Package Evolution Service.", "====> * setuptargetrepos", " Produces list of repositories that should be available to be used by Upgrade process.", "==> Processing phase `Checks`", "====> * open_ssh_algorithms", " OpenSSH configuration does not contain any unsupported cryptographic algorithms.", "====> * checktargetrepos", " Check whether target yum repositories are specified.", "====> * satellite_upgrade_check", " Check state of Satellite system before upgrade", "====> * checkirssi", " Check if irssi is installed. If yes, write information about non-compatible changes.", "====> * check_os_release", " Check if the current RHEL minor version is supported. If not, inhibit the upgrade process.", "====> * zipl_check_boot_entries", " Inhibits the upgrade if a problematic Zipl configuration is detected on the system.", "====> * check_btrfs", " Check if Btrfs filesystem is in use. If yes, inhibit the upgrade process.", "====> * check_boot_avail_space", " Check if at least 100Mib of available space on /boot. If not, inhibit the upgrade process.", "====> * check_wireshark", " Report a couple of changes in tshark usage", "====> * sssd_check", " Check SSSD configuration for changes in RHEL8 and report them.", "====> * check_sap_hana", " If SAP HANA has been detected, several checks are performed to ensure a successful upgrade.", "====> * check_detected_devices_and_drivers", " Checks whether or not detected devices and drivers are usable on the target system.", "====> * check_root_symlinks", " Check if the symlinks /bin and /lib are relative, not absolute.", "====> * open_ssh_deprecated_directives_check", " Check for any deprecated directives in the OpenSSH configuration.", "====> * cups_check", " Reports changes in configuration between CUPS 1.6.3 and 2.2.6", "====> * check_ipa_server", " Check for ipa-server and inhibit upgrade", "====> * check_systemd_broken_symlinks", " Check whether some systemd symlinks are broken", "====> * check_mount_options", " Check for mount options preventing the upgrade.", "====> * check_system_arch", " Check if system is running at a supported architecture. If no, inhibit the upgrade process.", "====> * spamassassin_config_check", " Reports changes in spamassassin between RHEL-7 and RHEL-8", "====> * unsupported_upgrade_check", " Checks environment variables and produces a warning report if the upgrade is unsupported.", "====> * cephvolumescan", " Retrieves the list of encrypted Ceph OSD", "====> * check_installed_devel_kernels", " Inhibit IPU (in-place upgrade) when multiple devel kernels are installed.", "====> * check_skipped_repositories", " Produces a report if any repositories enabled on the system are going to be skipped.", "====> * multiple_package_versions", " Check for problematic 32bit packages installed together with 64bit ones.", "====> * check_grub_core", " Check whether we are on legacy (BIOS) system and instruct Leapp to upgrade GRUB core", "====> * check_consumed_assets", " Check whether Leapp is using correct data assets.", "====> * powertop", " Check if PowerTOP is installed. If yes, write information about non-compatible changes.", "====> * check_yum_plugins_enabled", " Checks that the required yum plugins are enabled.", "====> * sctp_checks", " Parses collected SCTP information and take necessary actions.", "====> * bacula_check", " Actor checking for presence of Bacula installation.", "====> * quagga_report", " Checking for babeld on RHEL-7.", "====> * check_nfs", " Check if NFS filesystem is in use. If yes, inhibit the upgrade process.", "====> * check_brltty", " Check if brltty is installed, check whether configuration update is needed.", "====> * check_target_iso", " Check that the provided target ISO is a valid ISO image and is located on a persistent partition.", "====> * python_inform_user", " This actor informs the user of differences in Python version and support in RHEL 8.", "====> * check_rhsmsku", " Ensure the system is subscribed to the subscription manager", "====> * check_insights_auto_register", " Checks if system can be automatically registered into Red Hat Insights", "====> * tcp_wrappers_check", " Check the list of packages previously compiled with TCP wrappers support", "====> * check_etc_releasever", " Check releasever info and provide a guidance based on the facts", "====> * removed_pam_modules_check", " Check if it is all right to disable PAM modules that are not in RHEL-8.", "====> * check_openssl_conf", " Check whether the openssl configuration and openssl-IBMCA.", "====> * check_sendmail", " Check if sendmail is installed, check whether configuration update is needed, inhibit upgrade if TCP wrappers", "====> * open_ssh_use_privilege_separation", " UsePrivilegeSeparation configuration option was removed.", "====> * check_memcached", " Check for incompatible changes in memcached configuration.", "====> * check_fips", " Inhibit upgrade if FIPS is detected as enabled.", "====> * check_installed_debug_kernels", " Inhibit IPU (in-place upgrade) when multiple debug kernels are installed.", "====> * check_docker", " Checks if Docker is installed and warns about its deprecation in RHEL8.", "====> * check_custom_modifications_actor", " Checks CustomModifications messages and produces a report about files in leapp directories that have been", "====> * check_ntp", " Check if ntp and/or ntpdate configuration needs to be migrated.", "====> * openssh_permit_root_login", " OpenSSH no longer allows root logins with password.", "====> * multipath_conf_check", " Checks whether the multipath configuration can be updated to RHEL-8 and", "====> * checkmemory", " The actor check the size of RAM against RHEL8 minimal hardware requirements", "====> * enable_device_cio_free_service", " Enables device_cio_free.service systemd service on s390x", "====> * check_bind", " Actor parsing BIND configuration and checking for known issues in it.", "====> * check_postfix", " Check if postfix is installed, check whether configuration update is needed.", "====> * check_fstab_mount_order", " Checks order of entries in /etc/fstab based on their mount point and inhibits upgrade if overshadowing is detected.", "====> * checkhybridimage", " Check if the system is using Azure hybrid image.", "====> * check_installed_kernels", " Inhibit IPU (in-place upgrade) when installed kernels conflict with a safe upgrade.", "====> * checkfstabxfsoptions", " Check the FSTAB file for the deprecated / removed XFS mount options.", "====> * removed_pam_modules", " Check for modules that are not available in RHEL 8 anymore", "====> * check_chrony", " Check for incompatible changes in chrony configuration.", "====> * checkdosfstools", " Check if dosfstools is installed. If yes, write information about non-compatible changes.", "====> * open_ssh_protocol", " Protocol configuration option was removed.", "====> * checkacpid", " Check if acpid is installed. If yes, write information about non-compatible changes.", "====> * check_ha_cluster", " Check if HA Cluster is in use. If yes, inhibit the upgrade process.", "====> * check_cifs", " Check if CIFS filesystem is in use. If yes, inhibit the upgrade process.", "====> * authselect_check", " Confirm suggested authselect call from AuthselectScanner.", "====> * check_luks_and_inhibit", " Check if any encrypted partitions is in use. If yes, inhibit the upgrade process.", "====> * checkgrep", " Check if Grep is installed. If yes, write information about non-compatible changes.", "====> * check_dynamic_linker_configuration", " Check for customization of dynamic linker configuration.", "====> * check_rpm_transaction_events", " Filter RPM transaction events based on installed RPM packages", "====> * postgresql_check", " Actor checking for presence of PostgreSQL installation.", "====> * efi_check_boot", " Adjust EFI boot entry for first reboot", "====> * check_kde_gnome", " Checks whether KDE is installed", "====> * check_first_partition_offset", " Check whether the first partition starts at the offset >=1MiB.", "====> * check_removed_envvars", " Check for usage of removed environment variables and inhibit the upgrade", "====> * vsftpd_config_check", " Checks whether the vsftpd configuration is supported in RHEL-8. Namely checks that", "====> * red_hat_signed_rpm_check", " Check if there are packages not signed by Red Hat in use. If yes, warn user about it.", "====> * check_firewalld", " Check for certain firewalld configuration that may prevent an upgrade.", "====> * check_persistent_mounts", " Check if mounts required to be persistent are mounted in persistent fashion.", "====> * detect_grub_config_error", " Check grub configuration for various errors.", "====> * check_se_linux", " Check SELinux status and produce decision messages for further action.", "====> * check_skip_phase", " Skip all the subsequent phases until the report phase.", "==> Processing phase `Reports`", "====> * verify_check_results", " Check all dialogs and notify that user needs to make some choices.", "====> * verify_check_results", " Check all generated results messages and notify user about them.", "", "Debug output written to /var/log/leapp/leapp-preupgrade.log", "", "============================================================", " REPORT OVERVIEW ", "============================================================", "", "Upgrade has been inhibited due to the following problems:", " 1. Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", " 2. Use of NFS detected. Upgrade can't proceed", " 3. Use of CIFS detected. Upgrade can't proceed", "", "HIGH and MEDIUM severity reports:", " 1. Packages available in excluded repositories will not be installed", " 2. Upgrade is unsupported", " 3. GRUB2 core will be automatically updated during the upgrade", " 4. Difference in Python versions and support in RHEL 8", " 5. Module pam_pkcs11 will be removed from PAM configuration", " 6. chrony using default configuration", "", "Reports summary:", " Errors: 0", " Inhibitors: 3", " HIGH severity reports: 4", " MEDIUM severity reports: 2", " LOW severity reports: 5", " INFO severity reports: 3", "", "Before continuing, review the full report below for details about discovered problems and possible remediation instructions:", " A report has been generated at /var/log/leapp/leapp-report.txt", " A report has been generated at /var/log/leapp/leapp-report.json", "", "============================================================", " END OF REPORT OVERVIEW ", "============================================================", "", "Answerfile has been generated at /var/log/leapp/answerfile", "Job ended at 2025-12-17T20:31:02Z", ""]}, "changed": false} RUNNING HANDLER [infra.leapp.common : Rename log file] ************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:32 changed: [managed-node01] => {"changed": true, "cmd": "export PATH=$PATH\nmv /var/log/ripu/ripu.log /var/log/ripu/ripu.log-20251217T152943\n", "delta": "0:00:00.004393", "end": "2025-12-17 15:31:03.438172", "msg": "", "rc": 0, "start": "2025-12-17 15:31:03.433779", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} RUNNING HANDLER [infra.leapp.analysis : Display inhibitors] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/handlers/main.yml:32 ok: [managed-node01] => { "results_inhibitors.stdout_lines": [ "Risk Factor: high (inhibitor)", "Title: Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", "Summary: Support for the following RHEL 7 device drivers has been removed in RHEL 8:", " - pata_acpi", "", "Related links:", " - Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" : https://access.redhat.com/solutions/6971716", " - Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\": https://access.redhat.com/solutions/5436131", "Key: f08a07da902958defa4f5c2699fae9ec2eb67c5b", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Use of NFS detected. Upgrade can't proceed", "Summary: NFS is currently not supported by the inplace upgrade.", "We have found NFS usage at the following locations:", "- NFS shares found in /etc/fstab:", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat", " - nest.test.redhat.com:/mnt/qa /mnt/qa", " - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive", " - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch", "", "Related links:", " - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006", "Remediation: [hint] Disable NFS temporarily for the upgrade if possible.", "Key: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Use of CIFS detected. Upgrade can't proceed", "Summary: CIFS is currently not supported by the inplace upgrade.", "Related links:", " - Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\": https://access.redhat.com/solutions/6964304", "Remediation: [hint] Comment out CIFS entries to proceed with the upgrade.", "Key: d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "----------------------------------------" ] } RUNNING HANDLER [infra.leapp.analysis : Display errors] ************************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/handlers/main.yml:40 skipping: [managed-node01] => {} RUNNING HANDLER [infra.leapp.analysis : Preupgrade analysis report is done] **** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/handlers/main.yml:48 ok: [managed-node01] => { "msg": "The preupgrade analysis report generation is now complete. WARNING: Inhibitors found. Review the tasks above or the result file at /var/log/leapp/leapp-report.txt." } TASK [common_upgrade_tasks | Show all inhibitors collected by analysis] ******** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:28 ok: [managed-node01] => { "leapp_inhibitors": [ { "actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": { "external": [ { "title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716" }, { "title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131" } ] }, "groups": [ "kernel", "drivers", "inhibitor" ], "hostname": "managed-node01", "id": "ad1384a8f596f5cd6ea4d16958410dde9e4a1d5e65ca33a263697c69e7e80f83", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-12-17T20:30:34.215904Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed." }, { "actor": "check_nfs", "audience": "sysadmin", "detail": { "external": [ { "title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006" } ], "related_resources": [ { "scheme": "file", "title": "/etc/fstab" } ], "remediations": [ { "context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint" } ] }, "groups": [ "filesystem", "network", "inhibitor" ], "hostname": "managed-node01", "id": "de9851ec496751bac6de9b0065a70b34421f3eaff05277e8bf6b30edf2ae0a47", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2025-12-17T20:30:35.345678Z", "title": "Use of NFS detected. Upgrade can't proceed" }, { "actor": "check_cifs", "audience": "sysadmin", "detail": { "external": [ { "title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304" } ], "related_resources": [ { "scheme": "file", "title": "/etc/fstab" } ], "remediations": [ { "context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint" } ] }, "groups": [ "filesystem", "network", "inhibitor" ], "hostname": "managed-node01", "id": "383ed1d8ddea078f8852cef39692d29113338007ca4fc5400e131ce473200210", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2025-12-17T20:30:37.583778Z", "title": "Use of CIFS detected. Upgrade can't proceed" } ] } TASK [common_upgrade_tasks | Extract inhibitor titles] ************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:32 ok: [managed-node01] => {"ansible_facts": {"inhibitor_titles": ["Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", "Use of NFS detected. Upgrade can't proceed", "Use of CIFS detected. Upgrade can't proceed"]}, "changed": false} TASK [common_upgrade_tasks | Initialize remediation_todo] ********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:36 ok: [managed-node01] => {"ansible_facts": {"remediation_todo": []}, "changed": false} TASK [common_upgrade_tasks | Map inhibitors to remediation_todo] *************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:40 ok: [managed-node01] => (item=Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.) => {"ansible_facts": {"remediation_todo": ["leapp_loaded_removed_kernel_drivers"]}, "ansible_loop_var": "inhibitor_title", "changed": false, "inhibitor_title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."} ok: [managed-node01] => (item=Use of NFS detected. Upgrade can't proceed) => {"ansible_facts": {"remediation_todo": ["leapp_loaded_removed_kernel_drivers", "leapp_nfs_detected"]}, "ansible_loop_var": "inhibitor_title", "changed": false, "inhibitor_title": "Use of NFS detected. Upgrade can't proceed"} ok: [managed-node01] => (item=Use of CIFS detected. Upgrade can't proceed) => {"ansible_facts": {"remediation_todo": ["leapp_loaded_removed_kernel_drivers", "leapp_nfs_detected", "leapp_cifs_detected"]}, "ansible_loop_var": "inhibitor_title", "changed": false, "inhibitor_title": "Use of CIFS detected. Upgrade can't proceed"} TASK [common_upgrade_tasks | Debug remediation_todo] *************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:50 ok: [managed-node01] => { "remediation_todo": [ "leapp_loaded_removed_kernel_drivers", "leapp_nfs_detected", "leapp_cifs_detected" ] } TASK [common_upgrade_tasks | Run remediation] ********************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:54 TASK [infra.leapp.remediate : Check that the leapp-report.json exists] ********* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/main.yml:7 ok: [managed-node01] => {"changed": false, "stat": {"atime": 1766003461.3512425, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 48, "charset": "us-ascii", "checksum": "7c940e6dba5bb995130a8fb1c3c94d95c7327ed8", "ctime": 1766003438.519267, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 46137427, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1766003438.519267, "nlink": 1, "path": "/var/log/leapp/leapp-report.json", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 22829, "uid": 0, "version": "741717226", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} TASK [infra.leapp.remediate : Set leapp_report_missing to true if the leapp-report.json does not exist] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/main.yml:12 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.remediate : Read leapp report] ******************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/main.yml:17 ok: [managed-node01] => {"changed": false, "content": "{
  "leapp_run_id": "6478f090-418e-4a7b-93fb-681c4cc7ce32", 
  "entries": [
    {
      "groups": [
        "repository", 
        "failure"
      ], 
      "title": "Excluded target system repositories", 
      "timeStamp": "2025-12-17T20:30:31.291174Z", 
      "hostname": "managed-node01", 
      "detail": {
        "remediations": [
          {
            "type": "hint", 
            "context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times)."
          }
        ]
      }, 
      "actor": "repositories_blacklist", 
      "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms", 
      "audience": "sysadmin", 
      "key": "1b9132cb2362ae7830e48eee7811be9527747de8", 
      "id": "7907c1028b94da63ef5c31b0d71f6afbf6d5294488d8bbf732fab89abded587f", 
      "severity": "info"
    }, 
    {
      "groups": [
        "repository"
      ], 
      "title": "Packages available in excluded repositories will not be installed", 
      "timeStamp": "2025-12-17T20:30:33.446892Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "python3-pyxattr"
          }, 
          {
            "scheme": "package", 
            "title": "rpcgen"
          }
        ]
      }, 
      "actor": "pes_events_scanner", 
      "summary": "2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", 
      "audience": "sysadmin", 
      "key": "2437e204808f987477c0e9be8e4c95b3a87a9f3e", 
      "id": "80eb92ab09b52dddc2477333fb80ef366f0f3fc7fa0c3a03f1b2361eeeb6cb62", 
      "severity": "high"
    }, 
    {
      "groups": [
        "kernel", 
        "drivers", 
        "inhibitor"
      ], 
      "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", 
      "timeStamp": "2025-12-17T20:30:34.215904Z", 
      "hostname": "managed-node01", 
      "detail": {
        "external": [
          {
            "url": "https://access.redhat.com/solutions/6971716", 
            "title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" "
          }, 
          {
            "url": "https://access.redhat.com/solutions/5436131", 
            "title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\""
          }
        ]
      }, 
      "actor": "check_detected_devices_and_drivers", 
      "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n     - pata_acpi\n", 
      "audience": "sysadmin", 
      "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", 
      "id": "ad1384a8f596f5cd6ea4d16958410dde9e4a1d5e65ca33a263697c69e7e80f83", 
      "severity": "high"
    }, 
    {
      "groups": [
        "filesystem"
      ], 
      "title": "Detected broken systemd symlinks for non-existing services", 
      "timeStamp": "2025-12-17T20:30:34.408747Z", 
      "hostname": "managed-node01", 
      "detail": {
        "remediations": [
          {
            "type": "hint", 
            "context": "Remove the invalid symlinks before the upgrade."
          }, 
          {
            "type": "command", 
            "context": [
              "/usr/bin/rm", 
              "/etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service"
            ]
          }
        ]
      }, 
      "actor": "check_systemd_broken_symlinks", 
      "summary": "Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:\n    - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", 
      "audience": "sysadmin", 
      "key": "be2083fee03f5f0a708fd193d82d2fe20aee7217", 
      "id": "660ab36acf0a54e80f6fe1076704f07db724c3eac376f75d21a0611896e2a32e", 
      "severity": "low"
    }, 
    {
      "groups": [
        "upgrade process", 
        "sanity"
      ], 
      "title": "Upgrade is unsupported", 
      "timeStamp": "2025-12-17T20:30:34.558376Z", 
      "hostname": "managed-node01", 
      "actor": "unsupported_upgrade_check", 
      "summary": "Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.\n", 
      "audience": "sysadmin", 
      "key": "9e5088e3c1f371e020ec777c3d86578f4be143cf", 
      "id": "b264ef04e695982ec64e6f4eac24630d3caadb6eb18639e0bac3270c2dd8318f", 
      "severity": "high"
    }, 
    {
      "groups": [
        "repository"
      ], 
      "title": "Some enabled RPM repositories are unknown to Leapp", 
      "timeStamp": "2025-12-17T20:30:34.711173Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "libsolv"
          }, 
          {
            "scheme": "package", 
            "title": "python-perf"
          }, 
          {
            "scheme": "package", 
            "title": "kernel-tools-libs"
          }, 
          {
            "scheme": "package", 
            "title": "libreport-filesystem"
          }, 
          {
            "scheme": "package", 
            "title": "json-glib"
          }, 
          {
            "scheme": "package", 
            "title": "librepo"
          }, 
          {
            "scheme": "package", 
            "title": "kernel-tools"
          }, 
          {
            "scheme": "repository", 
            "title": "rhel"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket"
          }
        ]
      }, 
      "actor": "check_skipped_repositories", 
      "summary": "The following repositories with Red Hat-signed packages are unknown to Leapp:\n- rhel\nAnd the following packages installed from those repositories may not be upgraded:\n- libsolv\n- python-perf\n- kernel-tools-libs\n- libreport-filesystem\n- json-glib\n- librepo\n- kernel-tools", 
      "audience": "sysadmin", 
      "key": "8e89e20c645cea600b240156071d81c64daab7ad", 
      "id": "8f22ef4d17edac7f4cef866653aac7ef2ff150a7433b59c74bb08fa6c2f580c7", 
      "severity": "low"
    }, 
    {
      "groups": [
        "boot"
      ], 
      "title": "GRUB2 core will be automatically updated during the upgrade", 
      "timeStamp": "2025-12-17T20:30:34.898281Z", 
      "hostname": "managed-node01", 
      "actor": "check_grub_core", 
      "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", 
      "audience": "sysadmin", 
      "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", 
      "id": "8fd5990c7250790c8d05e397ce91c38a07b1f9b5a279e428bdd0fde5f95e0944", 
      "severity": "high"
    }, 
    {
      "groups": [
        "filesystem", 
        "network", 
        "inhibitor"
      ], 
      "title": "Use of NFS detected. Upgrade can't proceed", 
      "timeStamp": "2025-12-17T20:30:35.345678Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "file", 
            "title": "/etc/fstab"
          }
        ], 
        "external": [
          {
            "url": "https://access.redhat.com/solutions/6964006", 
            "title": "Why does leapp upgrade fail on detecting NFS during upgrade?"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Disable NFS temporarily for the upgrade if possible."
          }
        ]
      }, 
      "actor": "check_nfs", 
      "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", 
      "audience": "sysadmin", 
      "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", 
      "id": "de9851ec496751bac6de9b0065a70b34421f3eaff05277e8bf6b30edf2ae0a47", 
      "severity": "high"
    }, 
    {
      "groups": [
        "python"
      ], 
      "title": "Difference in Python versions and support in RHEL 8", 
      "timeStamp": "2025-12-17T20:30:35.504957Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "python"
          }, 
          {
            "scheme": "package", 
            "title": "python2"
          }, 
          {
            "scheme": "package", 
            "title": "python3"
          }
        ], 
        "external": [
          {
            "url": "https://red.ht/rhel-8-python", 
            "title": "Difference in Python versions and support in RHEL 8"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Please run \"alternatives --set python /usr/bin/python3\" after upgrade"
          }
        ]
      }, 
      "actor": "python_inform_user", 
      "summary": "In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", 
      "audience": "developer", 
      "key": "0c98585b1d8d252eb540bf61560094f3495351f5", 
      "id": "58fc3b82a0f26a9ce2222184f72ecdddc603555281328e7eb2360657225550e6", 
      "severity": "high"
    }, 
    {
      "groups": [
        "authentication", 
        "security", 
        "tools"
      ], 
      "title": "Module pam_pkcs11 will be removed from PAM configuration", 
      "timeStamp": "2025-12-17T20:30:35.926628Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "sssd"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Configure SSSD to replace pam_pkcs11"
          }
        ]
      }, 
      "actor": "removed_pam_modules_check", 
      "summary": "Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.", 
      "audience": "sysadmin", 
      "key": "bf47e7305d6805e8bbeaa7593cf01e38030c23f3", 
      "id": "61466ba489e9f0fbc678a84620e01e5907073304611c3962764996af9e9f657f", 
      "severity": "medium"
    }, 
    {
      "groups": [
        "services", 
        "email"
      ], 
      "title": "Postfix has incompatible changes in the next major version", 
      "timeStamp": "2025-12-17T20:30:36.784875Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "postfix"
          }
        ]
      }, 
      "actor": "check_postfix", 
      "summary": "Postfix 3.x has so called \"compatibility safety net\" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.\nThe backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.\nIt can be turned on by running:  \"postconf -e compatibility_level=0\nIt can be turned off by running: \"postconf -e compatibility_level=2\n\nIn the Postfix MySQL database client, the default \"option_group\" value has changed to \"client\", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set \"option_group\" to the empty string.\n\nThe postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.\n\nPostfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to \"auto\", and introduces a new parameter \"tls_eecdh_auto_curves\" with the names of curves that may be negotiated.\n\nThe \"master.cf\" chroot default value has changed from \"y\" (yes) to \"n\" (no). This applies to master.cf services where chroot field is not explicitly specified.\n\nThe \"append_dot_mydomain\" default value has changed from \"yes\" to \"no\". You may need changing it to \"yes\" if senders cannot use complete domain names in e-mail addresses.\n\nThe \"relay_domains\" default value has changed from \"$mydestination\" to the empty value. This could result in unexpected \"Relay access denied\" errors or ETRN errors, because now will postfix by default relay only for the localhost.\n\nThe \"mynetworks_style\" default value has changed from \"subnet\" to \"host\". This parameter is used to implement the \"permit_mynetworks\" feature. The change could result in unexpected \"access denied\" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.\n\nPostfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.\n", 
      "audience": "sysadmin", 
      "key": "5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33", 
      "id": "32f81ba683e5eb97933009c00adaf8de0582c338c8f10ddb409882dc9d931dc3", 
      "severity": "low"
    }, 
    {
      "groups": [
        "services", 
        "time management"
      ], 
      "title": "chrony using default configuration", 
      "timeStamp": "2025-12-17T20:30:37.310655Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "ntpd"
          }, 
          {
            "scheme": "package", 
            "title": "chrony"
          }, 
          {
            "scheme": "file", 
            "title": "/etc/chrony.conf"
          }
        ]
      }, 
      "actor": "check_chrony", 
      "summary": "default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives", 
      "audience": "sysadmin", 
      "key": "c4222ebd18730a76f6bc7b3b66df898b106e6554", 
      "id": "10296b29943bc119f732c818e068094a9d87a1d9ab6d5922ea10d6c289151e3b", 
      "severity": "medium"
    }, 
    {
      "groups": [
        "filesystem", 
        "network", 
        "inhibitor"
      ], 
      "title": "Use of CIFS detected. Upgrade can't proceed", 
      "timeStamp": "2025-12-17T20:30:37.583778Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "file", 
            "title": "/etc/fstab"
          }
        ], 
        "external": [
          {
            "url": "https://access.redhat.com/solutions/6964304", 
            "title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\""
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Comment out CIFS entries to proceed with the upgrade."
          }
        ]
      }, 
      "actor": "check_cifs", 
      "summary": "CIFS is currently not supported by the inplace upgrade.", 
      "audience": "sysadmin", 
      "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", 
      "id": "383ed1d8ddea078f8852cef39692d29113338007ca4fc5400e131ce473200210", 
      "severity": "high"
    }, 
    {
      "groups": [
        "authentication", 
        "security", 
        "tools"
      ], 
      "title": "Current PAM and nsswitch.conf configuration will be kept.", 
      "timeStamp": "2025-12-17T20:30:37.626560Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "authselect"
          }, 
          {
            "scheme": "package", 
            "title": "authconfig"
          }, 
          {
            "scheme": "file", 
            "title": "/etc/nsswitch.conf"
          }
        ]
      }, 
      "actor": "authselect_check", 
      "summary": "There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.", 
      "audience": "sysadmin", 
      "key": "40c4ab1da4a30dc1ca40e543f6385e1336d8810c", 
      "id": "5ca7905c765b9d764518a5ac59f7683675a4d899047255e4a0f2cffa95ce89c5", 
      "severity": "info"
    }, 
    {
      "groups": [
        "tools"
      ], 
      "title": "Grep has incompatible changes in the next major version", 
      "timeStamp": "2025-12-17T20:30:37.746124Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "grep"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Please update your scripts to be compatible with the changes."
          }
        ]
      }, 
      "actor": "checkgrep", 
      "summary": "If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.\nThe 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.\nIn locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.\nWhen searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.\nThe 'grep -z' no longer automatically treats the byte '\\200' as binary data.\nContext no longer excludes selected lines omitted because of -m. For example, 'grep \"^\" -m1 -A1' now outputs the first two input lines, not just the first line.\n", 
      "audience": "sysadmin", 
      "key": "94665a499e2eeee35eca3e7093a7abe183384b16", 
      "id": "13f2dbe811b055760849df5051947ae3dd8961e12c770933b7f79836dce92d0a", 
      "severity": "low"
    }, 
    {
      "groups": [
        "selinux", 
        "security"
      ], 
      "title": "SElinux relabeling will be scheduled", 
      "timeStamp": "2025-12-17T20:30:38.346479Z", 
      "hostname": "managed-node01", 
      "actor": "check_se_linux", 
      "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", 
      "audience": "sysadmin", 
      "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", 
      "id": "eda897d2cc54c61b4805fb8d03518931960bc57dc545ec81c4c1f7185e89576a", 
      "severity": "info"
    }, 
    {
      "groups": [
        "selinux", 
        "security"
      ], 
      "title": "SElinux will be set to permissive mode", 
      "timeStamp": "2025-12-17T20:30:38.350404Z", 
      "hostname": "managed-node01", 
      "detail": {
        "remediations": [
          {
            "type": "hint", 
            "context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings."
          }
        ]
      }, 
      "actor": "check_se_linux", 
      "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", 
      "audience": "sysadmin", 
      "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", 
      "id": "4311d4c4c504cc57a3ebe89fcee6acb25415555f703420db72b791d7d18f69e2", 
      "severity": "low"
    }
  ]
}
", "encoding": "base64", "source": "/var/log/leapp/leapp-report.json"} TASK [infra.leapp.remediate : Parse leapp report] ****************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/main.yml:23 ok: [managed-node01] => {"ansible_facts": {"leapp_report_data": {"entries": [{"actor": "repositories_blacklist", "audience": "sysadmin", "detail": {"remediations": [{"context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "type": "hint"}]}, "groups": ["repository", "failure"], "hostname": "managed-node01", "id": "7907c1028b94da63ef5c31b0d71f6afbf6d5294488d8bbf732fab89abded587f", "key": "1b9132cb2362ae7830e48eee7811be9527747de8", "severity": "info", "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms", "timeStamp": "2025-12-17T20:30:31.291174Z", "title": "Excluded target system repositories"}, {"actor": "pes_events_scanner", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "python3-pyxattr"}, {"scheme": "package", "title": "rpcgen"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "80eb92ab09b52dddc2477333fb80ef366f0f3fc7fa0c3a03f1b2361eeeb6cb62", "key": "2437e204808f987477c0e9be8e4c95b3a87a9f3e", "severity": "high", "summary": "2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", "timeStamp": "2025-12-17T20:30:33.446892Z", "title": "Packages available in excluded repositories will not be installed"}, {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "ad1384a8f596f5cd6ea4d16958410dde9e4a1d5e65ca33a263697c69e7e80f83", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-12-17T20:30:34.215904Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}, {"actor": "check_systemd_broken_symlinks", "audience": "sysadmin", "detail": {"remediations": [{"context": "Remove the invalid symlinks before the upgrade.", "type": "hint"}, {"context": ["/usr/bin/rm", "/etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service"], "type": "command"}]}, "groups": ["filesystem"], "hostname": "managed-node01", "id": "660ab36acf0a54e80f6fe1076704f07db724c3eac376f75d21a0611896e2a32e", "key": "be2083fee03f5f0a708fd193d82d2fe20aee7217", "severity": "low", "summary": "Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:\n - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", "timeStamp": "2025-12-17T20:30:34.408747Z", "title": "Detected broken systemd symlinks for non-existing services"}, {"actor": "unsupported_upgrade_check", "audience": "sysadmin", "groups": ["upgrade process", "sanity"], "hostname": "managed-node01", "id": "b264ef04e695982ec64e6f4eac24630d3caadb6eb18639e0bac3270c2dd8318f", "key": "9e5088e3c1f371e020ec777c3d86578f4be143cf", "severity": "high", "summary": "Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.\n", "timeStamp": "2025-12-17T20:30:34.558376Z", "title": "Upgrade is unsupported"}, {"actor": "check_skipped_repositories", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "libsolv"}, {"scheme": "package", "title": "python-perf"}, {"scheme": "package", "title": "kernel-tools-libs"}, {"scheme": "package", "title": "libreport-filesystem"}, {"scheme": "package", "title": "json-glib"}, {"scheme": "package", "title": "librepo"}, {"scheme": "package", "title": "kernel-tools"}, {"scheme": "repository", "title": "rhel"}], "remediations": [{"context": "You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket", "type": "hint"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "8f22ef4d17edac7f4cef866653aac7ef2ff150a7433b59c74bb08fa6c2f580c7", "key": "8e89e20c645cea600b240156071d81c64daab7ad", "severity": "low", "summary": "The following repositories with Red Hat-signed packages are unknown to Leapp:\n- rhel\nAnd the following packages installed from those repositories may not be upgraded:\n- libsolv\n- python-perf\n- kernel-tools-libs\n- libreport-filesystem\n- json-glib\n- librepo\n- kernel-tools", "timeStamp": "2025-12-17T20:30:34.711173Z", "title": "Some enabled RPM repositories are unknown to Leapp"}, {"actor": "check_grub_core", "audience": "sysadmin", "groups": ["boot"], "hostname": "managed-node01", "id": "8fd5990c7250790c8d05e397ce91c38a07b1f9b5a279e428bdd0fde5f95e0944", "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", "severity": "high", "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", "timeStamp": "2025-12-17T20:30:34.898281Z", "title": "GRUB2 core will be automatically updated during the upgrade"}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "de9851ec496751bac6de9b0065a70b34421f3eaff05277e8bf6b30edf2ae0a47", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2025-12-17T20:30:35.345678Z", "title": "Use of NFS detected. Upgrade can't proceed"}, {"actor": "python_inform_user", "audience": "developer", "detail": {"external": [{"title": "Difference in Python versions and support in RHEL 8", "url": "https://red.ht/rhel-8-python"}], "related_resources": [{"scheme": "package", "title": "python"}, {"scheme": "package", "title": "python2"}, {"scheme": "package", "title": "python3"}], "remediations": [{"context": "Please run \"alternatives --set python /usr/bin/python3\" after upgrade", "type": "hint"}]}, "groups": ["python"], "hostname": "managed-node01", "id": "58fc3b82a0f26a9ce2222184f72ecdddc603555281328e7eb2360657225550e6", "key": "0c98585b1d8d252eb540bf61560094f3495351f5", "severity": "high", "summary": "In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", "timeStamp": "2025-12-17T20:30:35.504957Z", "title": "Difference in Python versions and support in RHEL 8"}, {"actor": "removed_pam_modules_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "sssd"}], "remediations": [{"context": "Configure SSSD to replace pam_pkcs11", "type": "hint"}]}, "groups": ["authentication", "security", "tools"], "hostname": "managed-node01", "id": "61466ba489e9f0fbc678a84620e01e5907073304611c3962764996af9e9f657f", "key": "bf47e7305d6805e8bbeaa7593cf01e38030c23f3", "severity": "medium", "summary": "Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.", "timeStamp": "2025-12-17T20:30:35.926628Z", "title": "Module pam_pkcs11 will be removed from PAM configuration"}, {"actor": "check_postfix", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "postfix"}]}, "groups": ["services", "email"], "hostname": "managed-node01", "id": "32f81ba683e5eb97933009c00adaf8de0582c338c8f10ddb409882dc9d931dc3", "key": "5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33", "severity": "low", "summary": "Postfix 3.x has so called \"compatibility safety net\" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.\nThe backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.\nIt can be turned on by running: \"postconf -e compatibility_level=0\nIt can be turned off by running: \"postconf -e compatibility_level=2\n\nIn the Postfix MySQL database client, the default \"option_group\" value has changed to \"client\", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set \"option_group\" to the empty string.\n\nThe postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.\n\nPostfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to \"auto\", and introduces a new parameter \"tls_eecdh_auto_curves\" with the names of curves that may be negotiated.\n\nThe \"master.cf\" chroot default value has changed from \"y\" (yes) to \"n\" (no). This applies to master.cf services where chroot field is not explicitly specified.\n\nThe \"append_dot_mydomain\" default value has changed from \"yes\" to \"no\". You may need changing it to \"yes\" if senders cannot use complete domain names in e-mail addresses.\n\nThe \"relay_domains\" default value has changed from \"$mydestination\" to the empty value. This could result in unexpected \"Relay access denied\" errors or ETRN errors, because now will postfix by default relay only for the localhost.\n\nThe \"mynetworks_style\" default value has changed from \"subnet\" to \"host\". This parameter is used to implement the \"permit_mynetworks\" feature. The change could result in unexpected \"access denied\" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.\n\nPostfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.\n", "timeStamp": "2025-12-17T20:30:36.784875Z", "title": "Postfix has incompatible changes in the next major version"}, {"actor": "check_chrony", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "ntpd"}, {"scheme": "package", "title": "chrony"}, {"scheme": "file", "title": "/etc/chrony.conf"}]}, "groups": ["services", "time management"], "hostname": "managed-node01", "id": "10296b29943bc119f732c818e068094a9d87a1d9ab6d5922ea10d6c289151e3b", "key": "c4222ebd18730a76f6bc7b3b66df898b106e6554", "severity": "medium", "summary": "default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives", "timeStamp": "2025-12-17T20:30:37.310655Z", "title": "chrony using default configuration"}, {"actor": "check_cifs", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "383ed1d8ddea078f8852cef39692d29113338007ca4fc5400e131ce473200210", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2025-12-17T20:30:37.583778Z", "title": "Use of CIFS detected. Upgrade can't proceed"}, {"actor": "authselect_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "authselect"}, {"scheme": "package", "title": "authconfig"}, {"scheme": "file", "title": "/etc/nsswitch.conf"}]}, "groups": ["authentication", "security", "tools"], "hostname": "managed-node01", "id": "5ca7905c765b9d764518a5ac59f7683675a4d899047255e4a0f2cffa95ce89c5", "key": "40c4ab1da4a30dc1ca40e543f6385e1336d8810c", "severity": "info", "summary": "There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.", "timeStamp": "2025-12-17T20:30:37.626560Z", "title": "Current PAM and nsswitch.conf configuration will be kept."}, {"actor": "checkgrep", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "grep"}], "remediations": [{"context": "Please update your scripts to be compatible with the changes.", "type": "hint"}]}, "groups": ["tools"], "hostname": "managed-node01", "id": "13f2dbe811b055760849df5051947ae3dd8961e12c770933b7f79836dce92d0a", "key": "94665a499e2eeee35eca3e7093a7abe183384b16", "severity": "low", "summary": "If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.\nThe 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.\nIn locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.\nWhen searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.\nThe 'grep -z' no longer automatically treats the byte '\\200' as binary data.\nContext no longer excludes selected lines omitted because of -m. For example, 'grep \"^\" -m1 -A1' now outputs the first two input lines, not just the first line.\n", "timeStamp": "2025-12-17T20:30:37.746124Z", "title": "Grep has incompatible changes in the next major version"}, {"actor": "check_se_linux", "audience": "sysadmin", "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "eda897d2cc54c61b4805fb8d03518931960bc57dc545ec81c4c1f7185e89576a", "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", "severity": "info", "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", "timeStamp": "2025-12-17T20:30:38.346479Z", "title": "SElinux relabeling will be scheduled"}, {"actor": "check_se_linux", "audience": "sysadmin", "detail": {"remediations": [{"context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.", "type": "hint"}]}, "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "4311d4c4c504cc57a3ebe89fcee6acb25415555f703420db72b791d7d18f69e2", "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", "severity": "low", "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", "timeStamp": "2025-12-17T20:30:38.350404Z", "title": "SElinux will be set to permissive mode"}], "leapp_run_id": "6478f090-418e-4a7b-93fb-681c4cc7ce32"}}, "changed": false} TASK [infra.leapp.remediate : Check that the 6to7 preupgrade report exists] **** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/main.yml:28 ok: [managed-node01] => {"changed": false, "stat": {"exists": false}} TASK [infra.leapp.remediate : Set leapp_report_missing_6to7 to true if the 6to7 preupgrade report does not exist] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/main.yml:33 ok: [managed-node01] => {"ansible_facts": {"leapp_report_missing_6to7": true}, "changed": false} TASK [infra.leapp.remediate : Read 6to7 preupgrade report] ********************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/main.yml:38 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.remediate : Remediate the system] **************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/main.yml:44 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_cifs_detected.yml for managed-node01 => (item=leapp_cifs_detected) included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_loaded_removed_kernel_drivers.yml for managed-node01 => (item=leapp_loaded_removed_kernel_drivers) included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_nfs_detected.yml for managed-node01 => (item=leapp_nfs_detected) TASK [infra.leapp.remediate : leapp_cifs_detected | Comment CIFS shares in /etc/fstab] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_cifs_detected.yml:4 changed: [managed-node01] => {"changed": true, "msg": "1 replacements made", "rc": 0} TASK [infra.leapp.remediate : leapp_loaded_removed_kernel_drivers | Continue when leapp report is missing] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_loaded_removed_kernel_drivers.yml:2 skipping: [managed-node01] => {} TASK [infra.leapp.remediate : leapp_loaded_removed_kernel_drivers | End execution of playbook if no entry found in leapp report] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_loaded_removed_kernel_drivers.yml:15 skipping: [managed-node01] => {} TASK [infra.leapp.remediate : leapp_loaded_removed_kernel_drivers | Print unsupported modules] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_loaded_removed_kernel_drivers.yml:23 ok: [managed-node01] => { "unsupported_modules": [ "pata_acpi" ] } TASK [infra.leapp.remediate : leapp_loaded_removed_kernel_drivers | Unload unsupported modules] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_loaded_removed_kernel_drivers.yml:27 changed: [managed-node01] => (item=pata_acpi) => {"ansible_loop_var": "item", "changed": true, "item": "pata_acpi", "name": "pata_acpi", "params": "", "state": "absent"} TASK [infra.leapp.remediate : leapp_loaded_removed_kernel_drivers | Set list of unloaded modules] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_loaded_removed_kernel_drivers.yml:34 ok: [managed-node01] => {"ansible_facts": {"__leapp_debug_unsupported_modules": ["pata_acpi"]}, "changed": false} TASK [infra.leapp.remediate : leapp_nfs_detected | Continue when leapp report is missing] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_nfs_detected.yml:2 skipping: [managed-node01] => {} TASK [infra.leapp.remediate : leapp_nfs_detected | End execution of playbook if no entry found in leapp report] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_nfs_detected.yml:15 skipping: [managed-node01] => {} TASK [infra.leapp.remediate : leapp_nfs_detected | Get fstab_entries] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_nfs_detected.yml:25 ok: [managed-node01] => (item=- NFS shares found in /etc/fstab: - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat - nest.test.redhat.com:/mnt/qa /mnt/qa - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch ) => {"ansible_facts": {"fstab_entries": ["ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat", "nest.test.redhat.com:/mnt/qa", "vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive", "nest.test.redhat.com:/mnt/tpsdist", "ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot", "ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch"]}, "ansible_loop_var": "item", "changed": false, "item": "- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n"} TASK [infra.leapp.remediate : leapp_nfs_detected | Get nfs_mounts] ************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_nfs_detected.yml:31 skipping: [managed-node01] => (item=- NFS shares found in /etc/fstab: - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat - nest.test.redhat.com:/mnt/qa /mnt/qa - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch ) => {"ansible_loop_var": "item", "changed": false, "item": "- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => {"changed": false, "msg": "All items skipped"} TASK [infra.leapp.remediate : leapp_nfs_detected | Comment NFS shares in /etc/fstab] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_nfs_detected.yml:37 changed: [managed-node01] => (item=ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat) => {"ansible_loop_var": "item", "changed": true, "cmd": "set -o pipefail\nentry=\"ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat\"\ngrep -qF \"$entry\" /etc/fstab && sed -i \"s|^$entry|# $entry|\" /etc/fstab\n", "delta": "0:00:00.006460", "end": "2025-12-17 15:31:06.204676", "item": "ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat", "msg": "", "rc": 0, "start": "2025-12-17 15:31:06.198216", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} changed: [managed-node01] => (item=nest.test.redhat.com:/mnt/qa) => {"ansible_loop_var": "item", "changed": true, "cmd": "set -o pipefail\nentry=\"nest.test.redhat.com:/mnt/qa\"\ngrep -qF \"$entry\" /etc/fstab && sed -i \"s|^$entry|# $entry|\" /etc/fstab\n", "delta": "0:00:00.005835", "end": "2025-12-17 15:31:06.504359", "item": "nest.test.redhat.com:/mnt/qa", "msg": "", "rc": 0, "start": "2025-12-17 15:31:06.498524", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} changed: [managed-node01] => (item=vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive) => {"ansible_loop_var": "item", "changed": true, "cmd": "set -o pipefail\nentry=\"vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive\"\ngrep -qF \"$entry\" /etc/fstab && sed -i \"s|^$entry|# $entry|\" /etc/fstab\n", "delta": "0:00:00.006374", "end": "2025-12-17 15:31:06.791945", "item": "vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive", "msg": "", "rc": 0, "start": "2025-12-17 15:31:06.785571", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} changed: [managed-node01] => (item=nest.test.redhat.com:/mnt/tpsdist) => {"ansible_loop_var": "item", "changed": true, "cmd": "set -o pipefail\nentry=\"nest.test.redhat.com:/mnt/tpsdist\"\ngrep -qF \"$entry\" /etc/fstab && sed -i \"s|^$entry|# $entry|\" /etc/fstab\n", "delta": "0:00:00.006304", "end": "2025-12-17 15:31:07.092505", "item": "nest.test.redhat.com:/mnt/tpsdist", "msg": "", "rc": 0, "start": "2025-12-17 15:31:07.086201", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} changed: [managed-node01] => (item=ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot) => {"ansible_loop_var": "item", "changed": true, "cmd": "set -o pipefail\nentry=\"ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot\"\ngrep -qF \"$entry\" /etc/fstab && sed -i \"s|^$entry|# $entry|\" /etc/fstab\n", "delta": "0:00:00.005827", "end": "2025-12-17 15:31:07.433910", "item": "ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot", "msg": "", "rc": 0, "start": "2025-12-17 15:31:07.428083", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} changed: [managed-node01] => (item=ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch) => {"ansible_loop_var": "item", "changed": true, "cmd": "set -o pipefail\nentry=\"ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch\"\ngrep -qF \"$entry\" /etc/fstab && sed -i \"s|^$entry|# $entry|\" /etc/fstab\n", "delta": "0:00:00.006341", "end": "2025-12-17 15:31:07.740538", "item": "ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch", "msg": "", "rc": 0, "start": "2025-12-17 15:31:07.734197", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} TASK [infra.leapp.remediate : leapp_nfs_detected | Unmount NFS Mounts] ********* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_nfs_detected.yml:46 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [common_upgrade_tasks | Gather verify remediation tasks] ****************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:58 ok: [managed-node01 -> localhost] => {"changed": false, "examined": 2, "files": [{"atime": 1766002865.598552, "ctime": 1766002865.446552, "dev": 51716, "gid": 0, "gr_name": "root", "inode": 134217917, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1766002865.446552, "nlink": 1, "path": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/verify/remediate_cifs.yml", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 495, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}, {"atime": 1766002865.5995522, "ctime": 1766002865.5995522, "dev": 51716, "gid": 0, "gr_name": "root", "inode": 134217918, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1766002865.5995522, "nlink": 1, "path": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/verify/remediate_removed_kernel_drivers.yml", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 585, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}], "matched": 2, "msg": "All paths examined", "skipped_paths": {}} TASK [common_upgrade_tasks | Verify remediations] ****************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:66 included: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/verify/remediate_cifs.yml for managed-node01 => (item=/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/verify/remediate_cifs.yml) included: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/verify/remediate_removed_kernel_drivers.yml for managed-node01 => (item=/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/verify/remediate_removed_kernel_drivers.yml) TASK [verify | remediate_cifs | Verify the cifs shares remediation] ************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/verify/remediate_cifs.yml:5 ok: [managed-node01] => {"changed": false, "cmd": ["cat", "/etc/fstab"], "delta": "0:00:00.003266", "end": "2025-12-17 15:31:08.494033", "failed_when_result": false, "msg": "", "rc": 0, "start": "2025-12-17 15:31:08.490767", "stderr": "", "stderr_lines": [], "stdout": "\n#\n# /etc/fstab\n# Created by anaconda on Wed May 29 02:55:27 2024\n#\n# Accessible filesystems, by reference, are maintained under '/dev/disk'\n# See man pages fstab(5), findfs(8), mount(8) and/or blkid(8) for more info\n#\nUUID=9f5f2c38-40c6-4893-ad0c-80f2d92b88b4 / xfs defaults 0 0\n# ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat nfs ro,rsize=32768,wsize=8192,bg,noauto,noatime,nosuid,nodev,intr 0 0\n# nest.test.redhat.com:/mnt/qa /mnt/qa nfs defaults,rsize=8192,wsize=8192,bg,noauto,noatime,nosuid,nodev,intr 0 0\n# vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive nfs ro,rsize=32768,wsize=8192,bg,noauto,noatime,nosuid,nodev,intr 0 0\n# nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist nfs defaults,rsize=8192,wsize=8192,bg,noauto,noatime,nosuid,nodev,intr 0 0\n# ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew nfs ro,rsize=32768,wsize=8192,bg,noauto,noatime,nosuid,nodev,intr 0 0\n# ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch nfs ro,rsize=32768,wsize=8192,bg,noauto,noatime,nosuid,nodev,intr 0 0\n# //127.0.0.1/test_remediate_cifs /mnt/cifs cifs username=test,password=test 0 0", "stdout_lines": ["", "#", "# /etc/fstab", "# Created by anaconda on Wed May 29 02:55:27 2024", "#", "# Accessible filesystems, by reference, are maintained under '/dev/disk'", "# See man pages fstab(5), findfs(8), mount(8) and/or blkid(8) for more info", "#", "UUID=9f5f2c38-40c6-4893-ad0c-80f2d92b88b4 / xfs defaults 0 0", "# ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat nfs ro,rsize=32768,wsize=8192,bg,noauto,noatime,nosuid,nodev,intr 0 0", "# nest.test.redhat.com:/mnt/qa /mnt/qa nfs defaults,rsize=8192,wsize=8192,bg,noauto,noatime,nosuid,nodev,intr 0 0", "# vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive nfs ro,rsize=32768,wsize=8192,bg,noauto,noatime,nosuid,nodev,intr 0 0", "# nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist nfs defaults,rsize=8192,wsize=8192,bg,noauto,noatime,nosuid,nodev,intr 0 0", "# ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew nfs ro,rsize=32768,wsize=8192,bg,noauto,noatime,nosuid,nodev,intr 0 0", "# ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch nfs ro,rsize=32768,wsize=8192,bg,noauto,noatime,nosuid,nodev,intr 0 0", "# //127.0.0.1/test_remediate_cifs /mnt/cifs cifs username=test,password=test 0 0"]} TASK [verify | remediate_removed_kernel_drivers | Verify the removed kernel drivers remediation] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/verify/remediate_removed_kernel_drivers.yml:3 failed: [managed-node01] (item=pata_acpi) => {"__leapp_debug_unsupported_module": "pata_acpi", "ansible_loop_var": "__leapp_debug_unsupported_module", "changed": false, "cmd": ["modinfo", "pata_acpi"], "delta": "0:00:00.003883", "end": "2025-12-17 15:31:08.793725", "failed_when_result": true, "msg": "", "rc": 0, "start": "2025-12-17 15:31:08.789842", "stderr": "", "stderr_lines": [], "stdout": "filename: /lib/modules/3.10.0-1160.120.1.el7.x86_64/kernel/drivers/ata/pata_acpi.ko.xz\nversion: 0.2.3\nlicense: GPL\ndescription: SCSI low-level driver for ATA in ACPI mode\nauthor: Alan Cox\nretpoline: Y\nrhelversion: 7.9\nsrcversion: B77144288D161FC9BD37F5C\nalias: pci:v*d*sv*sd*bc01sc01i*\ndepends: libata\nintree: Y\nvermagic: 3.10.0-1160.120.1.el7.x86_64 SMP mod_unload modversions \nsigner: Red Hat Enterprise Linux kernel signing key\nsig_key: 5F:9B:43:92:61:6D:28:F8:C4:7C:F9:C1:CC:5C:EA:91:97:8C:9B:3B\nsig_hashalgo: sha256", "stdout_lines": ["filename: /lib/modules/3.10.0-1160.120.1.el7.x86_64/kernel/drivers/ata/pata_acpi.ko.xz", "version: 0.2.3", "license: GPL", "description: SCSI low-level driver for ATA in ACPI mode", "author: Alan Cox", "retpoline: Y", "rhelversion: 7.9", "srcversion: B77144288D161FC9BD37F5C", "alias: pci:v*d*sv*sd*bc01sc01i*", "depends: libata", "intree: Y", "vermagic: 3.10.0-1160.120.1.el7.x86_64 SMP mod_unload modversions ", "signer: Red Hat Enterprise Linux kernel signing key", "sig_key: 5F:9B:43:92:61:6D:28:F8:C4:7C:F9:C1:CC:5C:EA:91:97:8C:9B:3B", "sig_hashalgo: sha256"]} TASK [tests_upgrade_custom | Cleanup | Remove log files] *********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/tests_upgrade_custom.yml:49 changed: [managed-node01] => {"changed": true, "cmd": "set -euxo pipefail\nrm -f /var/log/leapp/leapp-upgrade.log\nrm -f /var/log/ripu/ripu.log*\n", "delta": "0:00:00.005174", "end": "2025-12-17 15:31:09.089657", "msg": "", "rc": 0, "start": "2025-12-17 15:31:09.084483", "stderr": "+ rm -f /var/log/leapp/leapp-upgrade.log\n+ rm -f /var/log/ripu/ripu.log-20251217T152943", "stderr_lines": ["+ rm -f /var/log/leapp/leapp-upgrade.log", "+ rm -f /var/log/ripu/ripu.log-20251217T152943"], "stdout": "", "stdout_lines": []} PLAY RECAP ********************************************************************* managed-node01 : ok=65 changed=13 unreachable=0 failed=1 skipped=18 rescued=0 ignored=0 -- Logs begin at Wed 2025-12-17 15:26:38 EST, end at Wed 2025-12-17 15:31:09 EST. -- Dec 17 15:29:43 managed-node01 ansible-ansible.legacy.setup[12597]: Invoked with filter=[] gather_subset=['all'] fact_path=/etc/ansible/facts.d gather_timeout=10 Dec 17 15:29:44 managed-node01 ansible-ansible.builtin.stat[12688]: Invoked with checksum_algorithm=sha1 get_checksum=True follow=False path=/var/log/leapp/leapp-upgrade.log get_md5=False get_mime=True get_attributes=True Dec 17 15:29:45 managed-node01 ansible-ansible.builtin.lineinfile[12750]: Invoked with group=None insertbefore=None unsafe_writes=False selevel=None create=False seuser=None serole=None owner=None backrefs=False search_string=None state=present firstmatch=False mode=None path=/etc/fstab insertafter=None regexp=None line=//127.0.0.1/test_remediate_cifs /mnt/cifs cifs username=test,password=test 0 0 attributes=None backup=False validate=None setype=None Dec 17 15:29:46 managed-node01 ansible-ansible.builtin.file[12811]: Invoked with src=None selevel=None force=False setype=None _original_basename=None unsafe_writes=False access_time=None seuser=None recurse=False state=directory access_time_format=%Y%m%d%H%M.%S group=root modification_time=None serole=None _diff_peek=None modification_time_format=%Y%m%d%H%M.%S path=/var/log/ripu owner=root follow=True attributes=None mode=0755 Dec 17 15:29:46 managed-node01 ansible-ansible.builtin.stat[12873]: Invoked with checksum_algorithm=sha1 get_checksum=True follow=False path=/var/log/ripu/ripu.log get_md5=False get_mime=True get_attributes=True Dec 17 15:29:46 managed-node01 ansible-ansible.legacy.stat[12934]: Invoked with checksum_algorithm=sha1 get_checksum=True path=/var/log/ripu/ripu.log follow=False get_md5=False get_mime=True get_attributes=True Dec 17 15:29:47 managed-node01 ansible-ansible.legacy.copy[12980]: Invoked with src=/root/.ansible/tmp/ansible-tmp-1766003386.5130155-8148-202815317831898/source directory_mode=None force=True attributes=None remote_src=None unsafe_writes=False dest=/var/log/ripu/ripu.log seuser=None setype=None group=root content=NOT_LOGGING_PARAMETER _original_basename=tmpj_73zsvc serole=None mode=0644 selevel=None owner=root follow=False validate=None checksum=fada9d472b443b4f5d835577fd7a6650e2c26790 backup=False local_follow=None Dec 17 15:29:47 managed-node01 ansible-ansible.builtin.file[13041]: Invoked with src=None selevel=None force=False setype=None _original_basename=None unsafe_writes=False access_time=None seuser=None recurse=False state=directory access_time_format=%Y%m%d%H%M.%S group=root modification_time=None serole=None _diff_peek=None modification_time_format=%Y%m%d%H%M.%S path=/etc/ansible/facts.d owner=root follow=True attributes=None mode=0755 Dec 17 15:29:47 managed-node01 ansible-ansible.legacy.stat[13103]: Invoked with checksum_algorithm=sha1 get_checksum=True path=/etc/ansible/facts.d/pre_ripu.fact follow=False get_md5=False get_mime=True get_attributes=True Dec 17 15:29:48 managed-node01 ansible-ansible.legacy.copy[13151]: Invoked with src=/root/.ansible/tmp/ansible-tmp-1766003387.613098-8199-46666967350113/source directory_mode=None force=True attributes=None remote_src=None unsafe_writes=False dest=/etc/ansible/facts.d/pre_ripu.fact seuser=None setype=None group=root content=NOT_LOGGING_PARAMETER _original_basename=tmp_zqdxobd serole=None mode=0644 selevel=None owner=root follow=False validate=None checksum=27a60a9d0bf0e849fd889d25a1a2b229cc593722 backup=False local_follow=None Dec 17 15:29:48 managed-node01 ansible-ansible.legacy.command[13213]: Invoked with executable=None _uses_shell=True strip_empty_ends=True _raw_params=set -o pipefail; export PATH=$PATH; rpm -qa | grep -ve '[\.|+]el7' | grep -vE '^(gpg-pubkey|libmodulemd|katello-ca-consumer)' | sort removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Dec 17 15:29:49 managed-node01 ansible-ansible.legacy.stat[13279]: Invoked with checksum_algorithm=sha1 get_checksum=True path=/etc/ansible/facts.d/non_rhel_packages.fact follow=False get_md5=False get_mime=True get_attributes=True Dec 17 15:29:49 managed-node01 ansible-ansible.legacy.file[13311]: Invoked with force=False _original_basename=tmp9koi5fyp owner=root follow=True group=root unsafe_writes=False serole=None state=file selevel=None setype=None dest=/etc/ansible/facts.d/non_rhel_packages.fact access_time=None access_time_format=%Y%m%d%H%M.%S modification_time=None path=/etc/ansible/facts.d/non_rhel_packages.fact src=None seuser=None recurse=False _diff_peek=None mode=0644 modification_time_format=%Y%m%d%H%M.%S attributes=None Dec 17 15:29:51 managed-node01 ansible-ansible.legacy.yum[13373]: Invoked with lock_timeout=30 update_cache=False conf_file=None exclude=[] allow_downgrade=False sslverify=True disable_gpg_check=False disable_excludes=None use_backend=auto validate_certs=True state=latest disablerepo=[] releasever=None skip_broken=False cacheonly=False autoremove=False download_dir=None installroot=/ install_weak_deps=True name=['leapp-upgrade'] download_only=False bugfix=False list=None install_repoquery=True update_only=False disable_plugin=[] enablerepo=['rhel-7-server-extras-rpms'] security=False enable_plugin=[] Dec 17 15:29:57 managed-node01 ansible-ansible.builtin.file[13467]: Invoked with src=None selevel=None force=False setype=None _original_basename=None unsafe_writes=False access_time=None seuser=None recurse=False state=directory access_time_format=%Y%m%d%H%M.%S group=root modification_time=None serole=None _diff_peek=None modification_time_format=%Y%m%d%H%M.%S path=/var/log/leapp owner=root follow=True attributes=None mode=0700 Dec 17 15:29:57 managed-node01 ansible-ansible.legacy.stat[13528]: Invoked with checksum_algorithm=sha1 get_checksum=True path=/var/log/leapp/answerfile follow=False get_md5=False get_mime=True get_attributes=True Dec 17 15:29:57 managed-node01 ansible-ansible.legacy.copy[13577]: Invoked with src=/root/.ansible/tmp/ansible-tmp-1766003397.245587-9185-1899103335564/source directory_mode=None force=True attributes=None remote_src=None unsafe_writes=False dest=/var/log/leapp/answerfile seuser=None setype=None group=root content=NOT_LOGGING_PARAMETER _original_basename=tmp0jodxg3w serole=None mode=0644 selevel=None owner=root follow=False validate=None checksum=3d934ad808576e3a7fb4c14a89645a4ad55ccf53 backup=False local_follow=None Dec 17 15:29:58 managed-node01 ansible-ansible.builtin.file[13638]: Invoked with src=None selevel=None force=False setype=None _original_basename=None unsafe_writes=False access_time=None seuser=None recurse=False state=absent access_time_format=%Y%m%d%H%M.%S group=None modification_time=None serole=None _diff_peek=None modification_time_format=%Y%m%d%H%M.%S path=/etc/leapp/files/leapp_upgrade_repositories.repo owner=None follow=True attributes=None mode=None Dec 17 15:29:59 managed-node01 ansible-async_wrapper.py[13829]: Invoked with j599168551211 7200 /root/.ansible/tmp/ansible-tmp-1766003398.819757-9290-270021023132246/AnsiballZ_command.py _ Dec 17 15:29:59 managed-node01 ansible-async_wrapper.py[13832]: Starting module and watcher Dec 17 15:29:59 managed-node01 ansible-async_wrapper.py[13832]: Start watching 13833 (7200) Dec 17 15:29:59 managed-node01 ansible-async_wrapper.py[13833]: Start module (13833) Dec 17 15:29:59 managed-node01 ansible-async_wrapper.py[13829]: Return async_wrapper task started. Dec 17 15:29:59 managed-node01 ansible-ansible.legacy.command[13834]: Invoked with executable=/bin/bash _uses_shell=True strip_empty_ends=True _raw_params=set -o pipefail; export PATH=$PATH; ulimit -n 16384; leapp preupgrade --report-schema=1.2.0 --no-rhsm 2>&1 | tee -a /var/log/ripu/ripu.log removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Dec 17 15:30:04 managed-node01 ansible-async_wrapper.py[13832]: 13833 still running (7200) Dec 17 15:30:09 managed-node01 ansible-async_wrapper.py[13832]: 13833 still running (7195) Dec 17 15:30:14 managed-node01 ansible-async_wrapper.py[13832]: 13833 still running (7190) Dec 17 15:30:19 managed-node01 ansible-async_wrapper.py[13832]: 13833 still running (7185) Dec 17 15:30:24 managed-node01 ansible-async_wrapper.py[13832]: 13833 still running (7180) Dec 17 15:30:29 managed-node01 ansible-async_wrapper.py[13832]: 13833 still running (7175) Dec 17 15:30:34 managed-node01 ansible-async_wrapper.py[13832]: 13833 still running (7170) Dec 17 15:30:38 managed-node01 ansible-async_wrapper.py[13833]: Module complete (13833) Dec 17 15:30:39 managed-node01 ansible-async_wrapper.py[13832]: Done in kid B. Dec 17 15:30:58 managed-node01 sshd[12029]: Received disconnect from 10.31.10.110 port 35742:11: disconnected by user Dec 17 15:30:58 managed-node01 sshd[12029]: Disconnected from 10.31.10.110 port 35742 Dec 17 15:30:58 managed-node01 sshd[12029]: pam_unix(sshd:session): session closed for user root Dec 17 15:30:58 managed-node01 systemd-logind[537]: Removed session 2. -- Subject: Session 2 has been terminated -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- Documentation: http://www.freedesktop.org/wiki/Software/systemd/multiseat -- -- A session with the ID 2 has been terminated. Dec 17 15:30:58 managed-node01 systemd[1]: Removed slice User Slice of root. -- Subject: Unit user-0.slice has finished shutting down -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- -- Unit user-0.slice has finished shutting down. Dec 17 15:30:59 managed-node01 sshd[21976]: Accepted publickey for root from 10.31.10.110 port 45498 ssh2: ECDSA SHA256:3/fesj3I+P+YZcfQuUG2Nt2OZZGpGO64+tMiF0/TgbY Dec 17 15:30:59 managed-node01 systemd[1]: Created slice User Slice of root. -- Subject: Unit user-0.slice has finished start-up -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- -- Unit user-0.slice has finished starting up. -- -- The start-up result is done. Dec 17 15:30:59 managed-node01 systemd-logind[537]: New session 4 of user root. -- Subject: A new session 4 has been created for user root -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- Documentation: http://www.freedesktop.org/wiki/Software/systemd/multiseat -- -- A new session with the ID 4 has been created for the user root. -- -- The leading process of the session is 21976. Dec 17 15:30:59 managed-node01 systemd[1]: Started Session 4 of user root. -- Subject: Unit session-4.scope has finished start-up -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- -- Unit session-4.scope has finished starting up. -- -- The start-up result is done. Dec 17 15:30:59 managed-node01 sshd[21976]: pam_unix(sshd:session): session opened for user root by (uid=0) Dec 17 15:30:59 managed-node01 ansible-ansible.legacy.async_status[22038]: Invoked with jid=j599168551211.13829 mode=status _async_dir=/root/.ansible_async Dec 17 15:31:00 managed-node01 ansible-ansible.legacy.async_status[22076]: Invoked with jid=j599168551211.13829 mode=cleanup _async_dir=/root/.ansible_async Dec 17 15:31:00 managed-node01 ansible-ansible.builtin.stat[22137]: Invoked with checksum_algorithm=sha1 get_checksum=True follow=False path=/var/log/leapp/leapp-report.txt get_md5=False get_mime=True get_attributes=True Dec 17 15:31:01 managed-node01 ansible-ansible.builtin.slurp[22201]: Invoked with src=/var/log/leapp/leapp-report.txt Dec 17 15:31:01 managed-node01 ansible-ansible.builtin.slurp[22262]: Invoked with src=/var/log/leapp/leapp-report.json Dec 17 15:31:01 managed-node01 ansible-ansible.legacy.command[22323]: Invoked with executable=None _uses_shell=False strip_empty_ends=True _raw_params=awk '/\(inhibitor\)/,/^-------/' /var/log/leapp/leapp-report.txt removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Dec 17 15:31:02 managed-node01 ansible-ansible.legacy.command[22385]: Invoked with executable=None _uses_shell=False strip_empty_ends=True _raw_params=awk '/high \(error\)/,/^-------/' /var/log/leapp/leapp-report.txt removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Dec 17 15:31:02 managed-node01 ansible-ansible.builtin.stat[22448]: Invoked with checksum_algorithm=sha1 get_checksum=True follow=False path=/var/log/ripu/ripu.log get_md5=False get_mime=True get_attributes=True Dec 17 15:31:02 managed-node01 ansible-ansible.builtin.lineinfile[22511]: Invoked with group=root insertbefore=None unsafe_writes=False selevel=None create=False seuser=None serole=None backrefs=False search_string=None state=present firstmatch=False mode=0644 insertafter=None path=/var/log/ripu/ripu.log owner=root regexp=None line=Job ended at 2025-12-17T20:31:02Z attributes=None backup=False validate=None setype=None Dec 17 15:31:03 managed-node01 ansible-ansible.builtin.slurp[22572]: Invoked with src=/var/log/ripu/ripu.log Dec 17 15:31:03 managed-node01 ansible-ansible.legacy.command[22633]: Invoked with executable=None _uses_shell=True strip_empty_ends=True _raw_params=export PATH=$PATH mv /var/log/ripu/ripu.log /var/log/ripu/ripu.log-20251217T152943 removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Dec 17 15:31:04 managed-node01 ansible-ansible.builtin.stat[22696]: Invoked with checksum_algorithm=sha1 get_checksum=True follow=False path=/var/log/leapp/leapp-report.json get_md5=False get_mime=True get_attributes=True Dec 17 15:31:04 managed-node01 ansible-ansible.builtin.slurp[22759]: Invoked with src=/var/log/leapp/leapp-report.json Dec 17 15:31:04 managed-node01 ansible-ansible.builtin.stat[22820]: Invoked with checksum_algorithm=sha1 get_checksum=True follow=False path=/root/preupgrade/result.txt get_md5=False get_mime=True get_attributes=True Dec 17 15:31:05 managed-node01 ansible-ansible.builtin.replace[22882]: Invoked with seuser=None group=None encoding=utf-8 unsafe_writes=False selevel=None after=None setype=None replace=# \1cifs\2 serole=None mode=None regexp=(.*)cifs(.*) owner=None path=/etc/fstab validate=None attributes=None backup=False before=None Dec 17 15:31:05 managed-node01 ansible-community.general.modprobe[22943]: Invoked with state=absent params= name=pata_acpi persistent=disabled Dec 17 15:31:06 managed-node01 ansible-ansible.legacy.command[23010]: Invoked with executable=None _uses_shell=True strip_empty_ends=True _raw_params=set -o pipefail entry="ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat" grep -qF "$entry" /etc/fstab && sed -i "s|^$entry|# $entry|" /etc/fstab removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Dec 17 15:31:06 managed-node01 ansible-ansible.legacy.command[23074]: Invoked with executable=None _uses_shell=True strip_empty_ends=True _raw_params=set -o pipefail entry="nest.test.redhat.com:/mnt/qa" grep -qF "$entry" /etc/fstab && sed -i "s|^$entry|# $entry|" /etc/fstab removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Dec 17 15:31:06 managed-node01 ansible-ansible.legacy.command[23138]: Invoked with executable=None _uses_shell=True strip_empty_ends=True _raw_params=set -o pipefail entry="vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive" grep -qF "$entry" /etc/fstab && sed -i "s|^$entry|# $entry|" /etc/fstab removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Dec 17 15:31:07 managed-node01 ansible-ansible.legacy.command[23202]: Invoked with executable=None _uses_shell=True strip_empty_ends=True _raw_params=set -o pipefail entry="nest.test.redhat.com:/mnt/tpsdist" grep -qF "$entry" /etc/fstab && sed -i "s|^$entry|# $entry|" /etc/fstab removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Dec 17 15:31:07 managed-node01 ansible-ansible.legacy.command[23267]: Invoked with executable=None _uses_shell=True strip_empty_ends=True _raw_params=set -o pipefail entry="ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot" grep -qF "$entry" /etc/fstab && sed -i "s|^$entry|# $entry|" /etc/fstab removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Dec 17 15:31:07 managed-node01 ansible-ansible.legacy.command[23331]: Invoked with executable=None _uses_shell=True strip_empty_ends=True _raw_params=set -o pipefail entry="ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch" grep -qF "$entry" /etc/fstab && sed -i "s|^$entry|# $entry|" /etc/fstab removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Dec 17 15:31:08 managed-node01 ansible-ansible.legacy.command[23395]: Invoked with executable=None _uses_shell=False strip_empty_ends=True _raw_params=cat /etc/fstab removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Dec 17 15:31:08 managed-node01 ansible-ansible.legacy.command[23458]: Invoked with executable=None _uses_shell=False strip_empty_ends=True _raw_params=modinfo pata_acpi removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Dec 17 15:31:09 managed-node01 ansible-ansible.legacy.command[23520]: Invoked with executable=/bin/bash _uses_shell=True strip_empty_ends=True _raw_params=set -euxo pipefail rm -f /var/log/leapp/leapp-upgrade.log rm -f /var/log/ripu/ripu.log* removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Dec 17 15:31:09 managed-node01 sshd[23533]: Accepted publickey for root from 10.31.10.110 port 57628 ssh2: RSA SHA256:9j1blwt3wcrRiGYZQ7ZGu9axm3cDklH6/z4c+Ee8CzE Dec 17 15:31:09 managed-node01 systemd-logind[537]: New session 5 of user root. -- Subject: A new session 5 has been created for user root -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- Documentation: http://www.freedesktop.org/wiki/Software/systemd/multiseat -- -- A new session with the ID 5 has been created for the user root. -- -- The leading process of the session is 23533. Dec 17 15:31:09 managed-node01 systemd[1]: Started Session 5 of user root. -- Subject: Unit session-5.scope has finished start-up -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- -- Unit session-5.scope has finished starting up. -- -- The start-up result is done. Dec 17 15:31:09 managed-node01 sshd[23533]: pam_unix(sshd:session): session opened for user root by (uid=0) Dec 17 15:31:09 managed-node01 sshd[23533]: Received disconnect from 10.31.10.110 port 57628:11: disconnected by user Dec 17 15:31:09 managed-node01 sshd[23533]: Disconnected from 10.31.10.110 port 57628 Dec 17 15:31:09 managed-node01 sshd[23533]: pam_unix(sshd:session): session closed for user root Dec 17 15:31:09 managed-node01 systemd-logind[537]: Removed session 5. -- Subject: Session 5 has been terminated -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- Documentation: http://www.freedesktop.org/wiki/Software/systemd/multiseat -- -- A session with the ID 5 has been terminated. Dec 17 15:31:09 managed-node01 sshd[23546]: Accepted publickey for root from 10.31.10.110 port 57632 ssh2: RSA SHA256:9j1blwt3wcrRiGYZQ7ZGu9axm3cDklH6/z4c+Ee8CzE Dec 17 15:31:09 managed-node01 systemd-logind[537]: New session 6 of user root. -- Subject: A new session 6 has been created for user root -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- Documentation: http://www.freedesktop.org/wiki/Software/systemd/multiseat -- -- A new session with the ID 6 has been created for the user root. -- -- The leading process of the session is 23546. Dec 17 15:31:09 managed-node01 systemd[1]: Started Session 6 of user root. -- Subject: Unit session-6.scope has finished start-up -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- -- Unit session-6.scope has finished starting up. -- -- The start-up result is done. Dec 17 15:31:09 managed-node01 sshd[23546]: pam_unix(sshd:session): session opened for user root by (uid=0)