[WARNING]: Collection infra.leapp does not support Ansible version 2.14.18 [WARNING]: running playbook inside collection infra.leapp ansible-playbook [core 2.14.18] config file = /etc/ansible/ansible.cfg configured module search path = ['/root/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] ansible python module location = /usr/lib/python3.9/site-packages/ansible ansible collection location = /root/.ansible/collections:/usr/share/ansible/collections executable location = /usr/bin/ansible-playbook python version = 3.9.25 (main, Jan 14 2026, 00:00:00) [GCC 11.5.0 20240719 (Red Hat 11.5.0-11)] (/usr/bin/python3) jinja version = 3.1.2 libyaml = True Using /etc/ansible/ansible.cfg as config file Skipping callback 'default', as we already have a stdout callback. Skipping callback 'minimal', as we already have a stdout callback. Skipping callback 'oneline', as we already have a stdout callback. PLAYBOOK: tests_remediations_7to8.yml ****************************************** 1 plays in /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_remediations_7to8.yml PLAY [Test RHEL 7 to 8 remediations] ******************************************* TASK [Gathering Facts] ********************************************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_remediations_7to8.yml:2 ok: [managed-node01] TASK [Include tests_upgrade_custom playbook] *********************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_remediations_7to8.yml:22 included: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/tests_upgrade_custom.yml for managed-node01 TASK [tests_upgrade_custom | Check if leapp upgrade log exists] **************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/tests_upgrade_custom.yml:12 ok: [managed-node01] => {"changed": false, "stat": {"exists": false}} TASK [tests_upgrade_custom | Skip test if already upgraded or not RHEL {{ rhel_base_ver }}] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/tests_upgrade_custom.yml:17 META: end_play conditional evaluated to False, continuing play skipping: [managed-node01] => {"msg": "end_play", "skip_reason": "end_play conditional evaluated to False, continuing play"} TASK [tests_upgrade_custom | Include common upgrade tasks] ********************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/tests_upgrade_custom.yml:27 included: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml for managed-node01 TASK [common_upgrade_tasks | Remove leapp packages] **************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:6 changed: [managed-node01] => {"changed": true, "changes": {"removed": ["leapp-upgrade"]}, "msg": "", "rc": 0, "results": ["Loaded plugins: product-id, search-disabled-repos, subscription-manager\n\nThis system is not registered with an entitlement server. You can use subscription-manager to register.\n\nResolving Dependencies\n--> Running transaction check\n---> Package leapp-upgrade-el7toel8.noarch 0:0.20.0-9.el7_9 will be erased\n--> Processing Dependency: leapp-repository for package: leapp-0.17.0-2.el7_9.noarch\n--> Running transaction check\n---> Package leapp.noarch 0:0.17.0-2.el7_9 will be erased\n--> Finished Dependency Resolution\n\nDependencies Resolved\n\n================================================================================\n Package Arch Version Repository Size\n================================================================================\nRemoving:\n leapp-upgrade-el7toel8 noarch 0.20.0-9.el7_9 @rhel-7-server-extras-rpms 9.7 M\nRemoving for dependencies:\n leapp noarch 0.17.0-2.el7_9 @rhel-7-server-extras-rpms 62 k\n\nTransaction Summary\n================================================================================\nRemove 1 Package (+1 Dependent package)\n\nInstalled size: 9.7 M\nDownloading packages:\nRunning transaction check\nRunning transaction test\nTransaction test succeeded\nRunning transaction\n Erasing : leapp-upgrade-el7toel8-0.20.0-9.el7_9.noarch 1/2 \n Erasing : leapp-0.17.0-2.el7_9.noarch 2/2 \n Verifying : leapp-0.17.0-2.el7_9.noarch 1/2 \n Verifying : leapp-upgrade-el7toel8-0.20.0-9.el7_9.noarch 2/2 \n\nRemoved:\n leapp-upgrade-el7toel8.noarch 0:0.20.0-9.el7_9 \n\nDependency Removed:\n leapp.noarch 0:0.17.0-2.el7_9 \n\nComplete!\n"]} TASK [common_upgrade_tasks | Gather setup tasks] ******************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:11 ok: [managed-node01 -> localhost] => {"changed": false, "examined": 4, "files": [{"atime": 1771331164.3426843, "ctime": 1771331164.1886785, "dev": 51716, "gid": 0, "gr_name": "root", "inode": 763363522, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1771331164.1886785, "nlink": 1, "path": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_cifs.yml", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 272, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}, {"atime": 1771331164.3426843, "ctime": 1771331164.1886785, "dev": 51716, "gid": 0, "gr_name": "root", "inode": 763363523, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1771331164.1886785, "nlink": 1, "path": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_remote_using_root.yml", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 268, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}, {"atime": 1771331164.3426843, "ctime": 1771331164.1886785, "dev": 51716, "gid": 0, "gr_name": "root", "inode": 763363524, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1771331164.1886785, "nlink": 1, "path": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_removed_kernel_drivers.yml", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 913, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}, {"atime": 1771331164.3426843, "ctime": 1771331164.1886785, "dev": 51716, "gid": 0, "gr_name": "root", "inode": 763363525, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1771331164.1886785, "nlink": 1, "path": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/version_lock.yml", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 548, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}], "matched": 4, "msg": "All paths examined", "skipped_paths": {}} TASK [common_upgrade_tasks | Do remediation setup tasks] *********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:18 included: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_cifs.yml for managed-node01 => (item=/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_cifs.yml) included: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_remote_using_root.yml for managed-node01 => (item=/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_remote_using_root.yml) included: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_removed_kernel_drivers.yml for managed-node01 => (item=/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_removed_kernel_drivers.yml) TASK [setup | remediate_cifs | Add a CIFS share to /etc/fstab] ***************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_cifs.yml:3 changed: [managed-node01] => {"backup": "", "changed": true, "msg": "line added"} TASK [setup | remediate_remote_using_root | Set the parameter to not remediate SSH password authentication] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_remote_using_root.yml:3 ok: [managed-node01] => {"ansible_facts": {"leapp_remediate_ssh_password_auth": false}, "changed": false} TASK [setup | remediate_removed_kernel_drivers | Set list of test kernel modules] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_removed_kernel_drivers.yml:4 ok: [managed-node01] => {"ansible_facts": {"leapp_test_kernel_modules": ["3w-9xxx", "pata_acpi", "tulip"]}, "changed": false} TASK [setup | remediate_removed_kernel_drivers | Load the test kernel modules] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_removed_kernel_drivers.yml:21 TASK [infra.leapp.common : manage_kernel_modules | Load or unload kernel modules] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_kernel_modules.yml:5 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml for managed-node01 => (item=3w-9xxx) included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml for managed-node01 => (item=pata_acpi) included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml for managed-node01 => (item=tulip) TASK [infra.leapp.common : manage_one_kernel_module | Load or unload kernel module] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:5 changed: [managed-node01] => {"changed": true, "name": "3w-9xxx", "params": "", "state": "present"} TASK [infra.leapp.common : manage_one_kernel_module | Disable modules-load.d file entry] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:17 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : manage_one_kernel_module | Ensure modules are not loaded at boot] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:25 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : manage_one_kernel_module | Debug modprobe.d file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:33 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : manage_one_kernel_module | Debug modules-load.d file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:37 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : manage_one_kernel_module | Load or unload kernel module] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:5 ok: [managed-node01] => {"changed": false, "name": "pata_acpi", "params": "", "state": "present"} TASK [infra.leapp.common : manage_one_kernel_module | Disable modules-load.d file entry] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:17 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : manage_one_kernel_module | Ensure modules are not loaded at boot] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:25 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : manage_one_kernel_module | Debug modprobe.d file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:33 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : manage_one_kernel_module | Debug modules-load.d file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:37 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : manage_one_kernel_module | Load or unload kernel module] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:5 changed: [managed-node01] => {"changed": true, "name": "tulip", "params": "", "state": "present"} TASK [infra.leapp.common : manage_one_kernel_module | Disable modules-load.d file entry] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:17 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : manage_one_kernel_module | Ensure modules are not loaded at boot] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:25 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : manage_one_kernel_module | Debug modprobe.d file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:33 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : manage_one_kernel_module | Debug modules-load.d file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:37 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [common_upgrade_tasks | Do setup tasks] *********************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:29 skipping: [managed-node01] => (item=/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/version_lock.yml) => {"ansible_loop_var": "setup_task_file", "changed": false, "setup_task_file": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/version_lock.yml", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => {"changed": false, "msg": "All items skipped"} TASK [common_upgrade_tasks | Run first analysis] ******************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:40 TASK [infra.leapp.common : Log directory exists] ******************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:3 ok: [managed-node01] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/var/log/ripu", "secontext": "unconfined_u:object_r:var_log_t:s0", "size": 6, "state": "directory", "uid": 0} TASK [infra.leapp.common : Check for existing log file] ************************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:11 ok: [managed-node01] => {"changed": false, "stat": {"exists": false}} TASK [infra.leapp.common : Fail if log file already exists] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:16 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : Create new log file] ******************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:23 NOTIFIED HANDLER infra.leapp.common : Check for log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Add end time to log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Slurp ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Decode ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Rename log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Check for log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Add end time to log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Slurp ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Decode ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Rename log file for managed-node01 changed: [managed-node01] => {"changed": true, "checksum": "98e93e8ec8861fe292fdf3dda8a8125881e17d95", "dest": "/var/log/ripu/ripu.log", "gid": 0, "group": "root", "md5sum": "fc3e51006703830e023e89c22de55a73", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:var_log_t:s0", "size": 61, "src": "/root/.ansible/tmp/ansible-tmp-1771331626.3979518-9420-118383829298130/source", "state": "file", "uid": 0} TASK [infra.leapp.common : /etc/ansible/facts.d directory exists] ************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:35 ok: [managed-node01] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc/ansible/facts.d", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 57, "state": "directory", "uid": 0} TASK [infra.leapp.common : Capture current ansible_facts for validation after upgrade] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:43 changed: [managed-node01] => {"changed": true, "checksum": "58544acb56c7eddcd18e3a5828810de5a296c2ae", "dest": "/etc/ansible/facts.d/pre_ripu.fact", "gid": 0, "group": "root", "md5sum": "2c82f655c5dbca75d3d5792ba9a0010c", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:etc_t:s0", "size": 11991, "src": "/root/.ansible/tmp/ansible-tmp-1771331627.7675266-9527-248133583776131/source", "state": "file", "uid": 0} TASK [infra.leapp.common : Capture a list of non-rhel versioned packages] ****** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:51 ok: [managed-node01] => {"changed": false, "cmd": "set -o pipefail; export PATH=$PATH; rpm -qa | grep -ve '[\\.|+]el7' | grep -vE '^(gpg-pubkey|libmodulemd|katello-ca-consumer)' | sort", "delta": "0:00:00.336986", "end": "2026-02-17 07:33:49.327646", "failed_when_result": false, "msg": "", "rc": 0, "start": "2026-02-17 07:33:48.990660", "stderr": "", "stderr_lines": [], "stdout": "epel-release-7-14.noarch\ntps-devel-2.44.50-1.noarch", "stdout_lines": ["epel-release-7-14.noarch", "tps-devel-2.44.50-1.noarch"]} TASK [infra.leapp.common : Create fact with the non-rhel versioned packages list] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:65 ok: [managed-node01] => {"ansible_facts": {"non_rhel_packages": ["epel-release-7-14.noarch", "tps-devel-2.44.50-1.noarch"]}, "changed": false} TASK [infra.leapp.common : Capture the list of non-rhel versioned packages in a separate fact file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:69 ok: [managed-node01] => {"changed": false, "checksum": "6d36b22d9c2b2f366fc090edfbac427c77d524a5", "dest": "/etc/ansible/facts.d/non_rhel_packages.fact", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/ansible/facts.d/non_rhel_packages.fact", "secontext": "system_u:object_r:etc_t:s0", "size": 58, "state": "file", "uid": 0} TASK [infra.leapp.analysis : Include tasks for preupg assistant analysis] ****** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:9 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : Include tasks for leapp preupgrade analysis] ****** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:13 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml for managed-node01 TASK [analysis-leapp | Register with Satellite activation key] ***************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:2 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [analysis-leapp | Include custom_local_repos for local_repos_pre_leapp] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:11 TASK [infra.leapp.common : custom_local_repos | Remove old /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:2 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : custom_local_repos | Validate repo definitions have baseurl or metalink] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:9 skipping: [managed-node01] => {"changed": false, "skipped_reason": "No items in the list"} TASK [infra.leapp.common : custom_local_repos | Enable custom upgrade yum repositories] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:16 skipping: [managed-node01] => {"changed": false, "skipped_reason": "No items in the list"} TASK [infra.leapp.analysis : analysis-leapp | Install packages for preupgrade analysis on RHEL 7] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:19 changed: [managed-node01] => {"changed": true, "changes": {"installed": ["leapp-upgrade"], "updated": []}, "msg": "", "rc": 0, "results": ["Loaded plugins: product-id, search-disabled-repos, subscription-manager\n\nThis system is not registered with an entitlement server. You can use subscription-manager to register.\n\nResolving Dependencies\n--> Running transaction check\n---> Package leapp-upgrade-el7toel8.noarch 0:0.20.0-9.el7_9 will be installed\n--> Processing Dependency: leapp for package: leapp-upgrade-el7toel8-0.20.0-9.el7_9.noarch\n--> Running transaction check\n---> Package leapp.noarch 0:0.17.0-2.el7_9 will be installed\n--> Finished Dependency Resolution\n\nDependencies Resolved\n\n================================================================================\n Package Arch Version Repository Size\n================================================================================\nInstalling:\n leapp-upgrade-el7toel8 noarch 0.20.0-9.el7_9 rhel-7-server-extras-rpms 1.2 M\nInstalling for dependencies:\n leapp noarch 0.17.0-2.el7_9 rhel-7-server-extras-rpms 29 k\n\nTransaction Summary\n================================================================================\nInstall 1 Package (+1 Dependent package)\n\nTotal download size: 1.3 M\nInstalled size: 9.7 M\nDownloading packages:\n--------------------------------------------------------------------------------\nTotal 7.9 MB/s | 1.3 MB 00:00 \nRunning transaction check\nRunning transaction test\nTransaction test succeeded\nRunning transaction\n Installing : leapp-upgrade-el7toel8-0.20.0-9.el7_9.noarch 1/2 \n Installing : leapp-0.17.0-2.el7_9.noarch 2/2 \n Verifying : leapp-0.17.0-2.el7_9.noarch 1/2 \n Verifying : leapp-upgrade-el7toel8-0.20.0-9.el7_9.noarch 2/2 \n\nInstalled:\n leapp-upgrade-el7toel8.noarch 0:0.20.0-9.el7_9 \n\nDependency Installed:\n leapp.noarch 0:0.17.0-2.el7_9 \n\nComplete!\n"]} TASK [infra.leapp.analysis : analysis-leapp | Install packages for preupgrade analysis on RHEL 8] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:26 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : analysis-leapp | Install packages for preupgrade analysis on RHEL 9] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:33 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : analysis-leapp | Ensure leapp log directory exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:40 ok: [managed-node01] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/var/log/leapp", "secontext": "system_u:object_r:var_log_t:s0", "size": 118, "state": "directory", "uid": 0} TASK [infra.leapp.analysis : analysis-leapp | Populate leapp_answers file] ***** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:48 changed: [managed-node01] => {"changed": true, "checksum": "3d934ad808576e3a7fb4c14a89645a4ad55ccf53", "dest": "/var/log/leapp/answerfile", "gid": 0, "group": "root", "md5sum": "01e375235c8e4cafdec593b260354063", "mode": "0644", "owner": "root", "secontext": "unconfined_u:object_r:var_log_t:s0", "size": 48, "src": "/root/.ansible/tmp/ansible-tmp-1771331634.8647442-9748-61320255236294/source", "state": "file", "uid": 0} TASK [analysis-leapp | Create /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:57 TASK [infra.leapp.common : custom_local_repos | Remove old /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:2 ok: [managed-node01] => {"changed": false, "path": "/etc/leapp/files/leapp_upgrade_repositories.repo", "state": "absent"} TASK [infra.leapp.common : custom_local_repos | Validate repo definitions have baseurl or metalink] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:9 ok: [managed-node01] => (item={'name': 'rhel-8-for-x86_64-baseos-rpms', 'description': 'BaseOS for x86_64', 'baseurl': 'http://download.devel.redhat.com/rhel-8/nightly/updates/RHEL-8/latest-RHEL-8.10/compose/BaseOS/x86_64/os/', 'state': 'present'}) => { "ansible_loop_var": "item", "changed": false, "item": { "baseurl": "http://download.devel.redhat.com/rhel-8/nightly/updates/RHEL-8/latest-RHEL-8.10/compose/BaseOS/x86_64/os/", "description": "BaseOS for x86_64", "name": "rhel-8-for-x86_64-baseos-rpms", "state": "present" }, "msg": "All assertions passed" } ok: [managed-node01] => (item={'name': 'rhel-8-for-x86_64-appstream-rpms', 'description': 'AppStream for x86_64', 'baseurl': 'http://download.devel.redhat.com/rhel-8/nightly/updates/RHEL-8/latest-RHEL-8.10/compose/AppStream/x86_64/os/', 'state': 'present'}) => { "ansible_loop_var": "item", "changed": false, "item": { "baseurl": "http://download.devel.redhat.com/rhel-8/nightly/updates/RHEL-8/latest-RHEL-8.10/compose/AppStream/x86_64/os/", "description": "AppStream for x86_64", "name": "rhel-8-for-x86_64-appstream-rpms", "state": "present" }, "msg": "All assertions passed" } TASK [infra.leapp.common : custom_local_repos | Enable custom upgrade yum repositories] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:16 changed: [managed-node01] => (item={'name': 'rhel-8-for-x86_64-baseos-rpms', 'description': 'BaseOS for x86_64', 'baseurl': 'http://download.devel.redhat.com/rhel-8/nightly/updates/RHEL-8/latest-RHEL-8.10/compose/BaseOS/x86_64/os/', 'state': 'present'}) => {"ansible_loop_var": "item", "changed": true, "item": {"baseurl": "http://download.devel.redhat.com/rhel-8/nightly/updates/RHEL-8/latest-RHEL-8.10/compose/BaseOS/x86_64/os/", "description": "BaseOS for x86_64", "name": "rhel-8-for-x86_64-baseos-rpms", "state": "present"}, "repo": "rhel-8-for-x86_64-baseos-rpms", "state": "present"} changed: [managed-node01] => (item={'name': 'rhel-8-for-x86_64-appstream-rpms', 'description': 'AppStream for x86_64', 'baseurl': 'http://download.devel.redhat.com/rhel-8/nightly/updates/RHEL-8/latest-RHEL-8.10/compose/AppStream/x86_64/os/', 'state': 'present'}) => {"ansible_loop_var": "item", "changed": true, "item": {"baseurl": "http://download.devel.redhat.com/rhel-8/nightly/updates/RHEL-8/latest-RHEL-8.10/compose/AppStream/x86_64/os/", "description": "AppStream for x86_64", "name": "rhel-8-for-x86_64-appstream-rpms", "state": "present"}, "repo": "rhel-8-for-x86_64-appstream-rpms", "state": "present"} TASK [infra.leapp.analysis : analysis-leapp | Leapp preupgrade report] ********* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:68 ASYNC FAILED on managed-node01: jid=j538480478614.14052 changed: [managed-node01] => {"ansible_job_id": "j538480478614.14052", "changed": true, "cmd": "set -o pipefail; export PATH=$PATH; ulimit -n 16384; leapp preupgrade --report-schema=1.2.0 --no-rhsm 2>&1 | tee -a /var/log/ripu/ripu.log\n", "delta": "0:00:38.394216", "end": "2026-02-17 07:34:40.565181", "failed_when_result": false, "finished": 1, "msg": "non-zero return code", "rc": 1, "results_file": "/root/.ansible_async/j538480478614.14052", "start": "2026-02-17 07:34:02.170965", "started": 1, "stderr": "", "stderr_lines": [], "stdout": "\n============================================================\n UNSUPPORTED UPGRADE \n============================================================\n\nVariable LEAPP_UNSUPPORTED has been detected. Proceeding at your own risk.\nDevelopment variables have been detected:\n- LEAPP_DEVEL_RPMS_ALL_SIGNED=1\n\n============================================================\n UNSUPPORTED UPGRADE \n============================================================\n\n==> Processing phase `configuration_phase`\n====> * ipu_workflow_config\n IPU workflow config actor\n==> Processing phase `FactsCollection`\n====> * get_enabled_modules\n Provides data about which module streams are enabled on the source system.\n====> * storage_scanner\n Provides data about storage settings.\n====> * transaction_workarounds\n Provides additional RPM transaction tasks based on bundled RPM packages.\n====> * scan_kernel_cmdline\n No documentation has been provided for the scan_kernel_cmdline actor.\n====> * repository_mapping\n Produces message containing repository mapping based on provided file.\n====> * scan_systemd_source\n Provides info about systemd on the source system\n====> * system_facts\n Provides data about many facts from system.\n====> * root_scanner\n Scan the system root directory and produce a message containing\n====> * scanclienablerepo\n Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.\n====> * scan_files_for_target_userspace\n Scan the source system and identify files that will be copied into the target userspace when it is created.\n====> * rpm_scanner\n Provides data about installed RPM Packages.\nLoaded plugins: product-id, subscription-manager\n\nThis system is not registered with an entitlement server. You can use subscription-manager to register.\n\n====> * trusted_gpg_keys_scanner\n Scan for trusted GPG keys.\n====> * scan_grub_config\n Scan grub configuration files for errors.\n====> * scan_subscription_manager_info\n Scans the current system for subscription manager information\n====> * common_leapp_dracut_modules\n Influences the generation of the initram disk\n====> * scan_custom_modifications_actor\n Collects information about files in leapp directories that have been modified or newly added.\n====> * register_yum_adjustment\n Registers a workaround which will adjust the yum directories during the upgrade.\n====> * source_boot_loader_scanner\n Scans the boot loader configuration on the source system.\n====> * scan_custom_repofile\n Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.\n====> * check_grub_legacy\n Check whether GRUB Legacy is installed in the MBR.\n====> * load_device_driver_deprecation_data\n Loads deprecation data for drivers and devices (PCI & CPU)\n====> * removed_pam_modules_scanner\n Scan PAM configuration for modules that are not available in RHEL-8.\n====> * scan_target_os_image\n Scans the provided target OS ISO image to use as a content source for the IPU, if any.\n====> * read_openssh_config\n Collect information about the OpenSSH configuration.\n====> * scanmemory\n Scan Memory of the machine.\n====> * scan_fips\n Determine whether the source system has FIPS enabled.\n====> * pci_devices_scanner\n Provides data about existing PCI Devices.\n====> * network_manager_read_config\n Provides data about NetworkManager configuration.\n====> * detect_kernel_drivers\n Matches all currently loaded kernel drivers against known deprecated and removed drivers.\n====> * persistentnetnames\n Get network interface information for physical ethernet interfaces of the original system.\n====> * sctp_read_status\n Determines whether or not the SCTP kernel module might be wanted.\n====> * tcp_wrappers_config_read\n Parse tcp_wrappers configuration files /etc/hosts.{allow,deny}.\n====> * distribution_signed_rpm_scanner\n Provide data about distribution signed & unsigned RPM packages.\n====> * checkrhui\n Check if system is using RHUI infrastructure (on public cloud) and send messages to\n====> * scan_grub_device_name\n Find the name of the block devices where GRUB is located\n====> * scan_grub_device_partition_layout\n Scan all identified GRUB devices for their partition layout.\n====> * biosdevname\n Enable biosdevname on the target RHEL system if all interfaces on the source RHEL\n====> * authselect_scanner\n Detect what authselect configuration should be suggested to administrator.\n====> * scan_source_kernel\n Scan the source system kernel.\n====> * xfs_info_scanner\n This actor scans all mounted mountpoints for XFS information\n====> * persistentnetnamesdisable\n Disable systemd-udevd persistent network naming on machine with single eth0 NIC\n====> * used_repository_scanner\n Scan used enabled repositories\n====> * vsftpd_config_read\n Reads vsftpd configuration files (/etc/vsftpd/*.conf) and extracts necessary information.\n====> * copy_dnf_conf_into_target_userspace\n Copy dnf.conf into target userspace\n====> * scan_pkg_manager\n Provides data about package manager (yum/dnf)\n====> * sssd_facts\n Check SSSD configuration for changes in RHEL8 and report them in model.\n====> * scan_sap_hana\n Gathers information related to SAP HANA instances on the system.\n====> * get_installed_desktops\n Actor checks if kde or gnome desktop environments\n====> * pam_modules_scanner\n Scan the pam directory for services and modules used in them\n====> * scan_source_files\n Scan files (explicitly specified) of the source system.\n====> * selinuxcontentscanner\n Scan the system for any SELinux customizations\n====> * scandasd\n In case of s390x architecture, check whether DASD is used.\n====> * firewalld_facts_actor\n Provide data about firewalld\n====> * scanzfcp\n In case of s390x architecture, check whether ZFCP is used.\n====> * quagga_daemons\n Active quagga daemons check.\n====> * remove_obsolete_gpg_keys\n Remove obsoleted RPM GPG keys.\n====> * udevadm_info\n Produces data exported by the \"udevadm info\" command.\n====> * satellite_upgrade_facts\n Report which Satellite packages require updates and how to handle PostgreSQL data\n====> * scancpu\n Scan CPUs of the machine.\n====> * cups_scanner\n Gather facts about CUPS features which needs to be migrated\n====> * repositories_blacklist\n Exclude target repositories provided by Red Hat without support.\n====> * check_kde_apps\n Actor checks which KDE apps are installed.\n====> * rpm_transaction_config_tasks_collector\n Provides additional RPM transaction tasks from /etc/leapp/transaction.\n====> * ipa_scanner\n Scan system for ipa-client and ipa-server status\n====> * spamassassin_config_read\n Reads spamc configuration (/etc/mail/spamassassin/spamc.conf), the\n====> * scan_dynamic_linker_configuration\n Scan the dynamic linker configuration and find modifications.\n====> * multipath_conf_read\n Read multipath configuration files and extract the necessary information\n====> * pes_events_scanner\n Provides data about package events from Package Evolution Service.\n====> * setuptargetrepos\n Produces list of repositories that should be available to be used by Upgrade process.\n==> Processing phase `Checks`\n====> * unsupported_upgrade_check\n Checks environment variables and produces a warning report if the upgrade is unsupported.\n====> * checkgrep\n Check if Grep is installed. If yes, write information about non-compatible changes.\n====> * check_cifs\n Check if CIFS filesystem is in use. If yes, inhibit the upgrade process.\n====> * check_root_symlinks\n Check if the symlinks /bin and /lib are relative, not absolute.\n====> * check_sap_hana\n If SAP HANA has been detected, several checks are performed to ensure a successful upgrade.\n====> * checktargetrepos\n Check whether target yum repositories are specified.\n====> * check_ntp\n Check if ntp and/or ntpdate configuration needs to be migrated.\n====> * check_mount_options\n Check for mount options preventing the upgrade.\n====> * python_inform_user\n This actor informs the user of differences in Python version and support in RHEL 8.\n====> * red_hat_signed_rpm_check\n Check if there are packages not signed by Red Hat in use. If yes, warn user about it.\n====> * check_rhsmsku\n Ensure the system is subscribed to the subscription manager\n====> * bacula_check\n Actor checking for presence of Bacula installation.\n====> * multipath_conf_check\n Checks whether the multipath configuration can be updated to RHEL-8 and\n====> * multiple_package_versions\n Check for problematic 32bit packages installed together with 64bit ones.\n====> * checkmemory\n The actor check the size of RAM against RHEL8 minimal hardware requirements\n====> * vsftpd_config_check\n Checks whether the vsftpd configuration is supported in RHEL-8. Namely checks that\n====> * check_nfs\n Check if NFS filesystem is in use. If yes, inhibit the upgrade process.\n====> * check_yum_plugins_enabled\n Checks that the required yum plugins are enabled.\n====> * check_first_partition_offset\n Check whether the first partition starts at the offset >=1MiB.\n====> * check_custom_modifications_actor\n Checks CustomModifications messages and produces a report about files in leapp directories that have been\n====> * quagga_report\n Checking for babeld on RHEL-7.\n====> * sssd_check\n Check SSSD configuration for changes in RHEL8 and report them.\n====> * check_ipa_server\n Check for ipa-server and inhibit upgrade\n====> * check_docker\n Checks if Docker is installed and warns about its deprecation in RHEL8.\n====> * zipl_check_boot_entries\n Inhibits the upgrade if a problematic Zipl configuration is detected on the system.\n====> * powertop\n Check if PowerTOP is installed. If yes, write information about non-compatible changes.\n====> * check_boot_avail_space\n Check if at least 100Mib of available space on /boot. If not, inhibit the upgrade process.\n====> * removed_pam_modules\n Check for modules that are not available in RHEL 8 anymore\n====> * open_ssh_deprecated_directives_check\n Check for any deprecated directives in the OpenSSH configuration.\n====> * check_grub_core\n Check whether we are on legacy (BIOS) system and instruct Leapp to upgrade GRUB core\n====> * spamassassin_config_check\n Reports changes in spamassassin between RHEL-7 and RHEL-8\n====> * check_openssl_conf\n Check whether the openssl configuration and openssl-IBMCA.\n====> * check_fstab_mount_order\n Checks order of entries in /etc/fstab based on their mount point and inhibits upgrade if overshadowing is detected.\n====> * check_systemd_broken_symlinks\n Check whether some systemd symlinks are broken\n====> * check_insights_auto_register\n Checks if system can be automatically registered into Red Hat Insights\n====> * removed_pam_modules_check\n Check if it is all right to disable PAM modules that are not in RHEL-8.\n====> * postgresql_check\n Actor checking for presence of PostgreSQL installation.\n====> * check_os_release\n Check if the current RHEL minor version is supported. If not, inhibit the upgrade process.\n====> * cups_check\n Reports changes in configuration between CUPS 1.6.3 and 2.2.6\n====> * check_installed_kernels\n Inhibit IPU (in-place upgrade) when installed kernels conflict with a safe upgrade.\n====> * openssh_permit_root_login\n OpenSSH no longer allows root logins with password.\n====> * check_brltty\n Check if brltty is installed, check whether configuration update is needed.\n====> * sctp_checks\n Parses collected SCTP information and take necessary actions.\n====> * check_sendmail\n Check if sendmail is installed, check whether configuration update is needed, inhibit upgrade if TCP wrappers\n====> * checkacpid\n Check if acpid is installed. If yes, write information about non-compatible changes.\n====> * checkhybridimage\n Check if the system is using Azure hybrid image.\n====> * check_detected_devices_and_drivers\n Checks whether or not detected devices and drivers are usable on the target system.\n====> * checkfstabxfsoptions\n Check the FSTAB file for the deprecated / removed XFS mount options.\n====> * cephvolumescan\n Retrieves the list of encrypted Ceph OSD\n====> * check_luks_and_inhibit\n Check if any encrypted partitions is in use. If yes, inhibit the upgrade process.\n====> * check_chrony\n Check for incompatible changes in chrony configuration.\n====> * check_dynamic_linker_configuration\n Check for customization of dynamic linker configuration.\n====> * tcp_wrappers_check\n Check the list of packages previously compiled with TCP wrappers support\n====> * check_consumed_assets\n Check whether Leapp is using correct data assets.\n====> * check_removed_envvars\n Check for usage of removed environment variables and inhibit the upgrade\n====> * checkdosfstools\n Check if dosfstools is installed. If yes, write information about non-compatible changes.\n====> * check_firewalld\n Check for certain firewalld configuration that may prevent an upgrade.\n====> * check_installed_devel_kernels\n Inhibit IPU (in-place upgrade) when multiple devel kernels are installed.\n====> * check_memcached\n Check for incompatible changes in memcached configuration.\n====> * check_kde_gnome\n Checks whether KDE is installed\n====> * check_wireshark\n Report a couple of changes in tshark usage\n====> * check_skipped_repositories\n Produces a report if any repositories enabled on the system are going to be skipped.\n====> * check_fips\n Inhibit upgrade if FIPS is detected as enabled.\n====> * check_bind\n Actor parsing BIND configuration and checking for known issues in it.\n====> * open_ssh_algorithms\n OpenSSH configuration does not contain any unsupported cryptographic algorithms.\n====> * check_se_linux\n Check SELinux status and produce decision messages for further action.\n====> * efi_check_boot\n Adjust EFI boot entry for first reboot\n====> * detect_grub_config_error\n Check grub configuration for various errors.\n====> * authselect_check\n Confirm suggested authselect call from AuthselectScanner.\n====> * check_btrfs\n Check if Btrfs filesystem is in use. If yes, inhibit the upgrade process.\n====> * check_installed_debug_kernels\n Inhibit IPU (in-place upgrade) when multiple debug kernels are installed.\n====> * open_ssh_protocol\n Protocol configuration option was removed.\n====> * check_persistent_mounts\n Check if mounts required to be persistent are mounted in persistent fashion.\n====> * check_target_iso\n Check that the provided target ISO is a valid ISO image and is located on a persistent partition.\n====> * open_ssh_use_privilege_separation\n UsePrivilegeSeparation configuration option was removed.\n====> * check_etc_releasever\n Check releasever info and provide a guidance based on the facts\n====> * satellite_upgrade_check\n Check state of Satellite system before upgrade\n====> * check_ha_cluster\n Check if HA Cluster is in use. If yes, inhibit the upgrade process.\n====> * check_postfix\n Check if postfix is installed, check whether configuration update is needed.\n====> * checkirssi\n Check if irssi is installed. If yes, write information about non-compatible changes.\n====> * enable_device_cio_free_service\n Enables device_cio_free.service systemd service on s390x\n====> * check_system_arch\n Check if system is running at a supported architecture. If no, inhibit the upgrade process.\n====> * check_rpm_transaction_events\n Filter RPM transaction events based on installed RPM packages\n====> * check_skip_phase\n Skip all the subsequent phases until the report phase.\n==> Processing phase `Reports`\n====> * verify_check_results\n Check all dialogs and notify that user needs to make some choices.\n====> * verify_check_results\n Check all generated results messages and notify user about them.\n\nDebug output written to /var/log/leapp/leapp-preupgrade.log\n\n============================================================\n REPORT OVERVIEW \n============================================================\n\nUpgrade has been inhibited due to the following problems:\n 1. Use of CIFS detected. Upgrade can't proceed\n 2. Use of NFS detected. Upgrade can't proceed\n 3. Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\n\nHIGH and MEDIUM severity reports:\n 1. Packages available in excluded repositories will not be installed\n 2. Upgrade is unsupported\n 3. Difference in Python versions and support in RHEL 8\n 4. GRUB2 core will be automatically updated during the upgrade\n 5. Module pam_pkcs11 will be removed from PAM configuration\n 6. chrony using default configuration\n\nReports summary:\n Errors: 0\n Inhibitors: 3\n HIGH severity reports: 4\n MEDIUM severity reports: 2\n LOW severity reports: 5\n INFO severity reports: 3\n\nBefore continuing, review the full report below for details about discovered problems and possible remediation instructions:\n A report has been generated at /var/log/leapp/leapp-report.txt\n A report has been generated at /var/log/leapp/leapp-report.json\n\n============================================================\n END OF REPORT OVERVIEW \n============================================================\n\nAnswerfile has been generated at /var/log/leapp/answerfile", "stdout_lines": ["", "============================================================", " UNSUPPORTED UPGRADE ", "============================================================", "", "Variable LEAPP_UNSUPPORTED has been detected. Proceeding at your own risk.", "Development variables have been detected:", "- LEAPP_DEVEL_RPMS_ALL_SIGNED=1", "", "============================================================", " UNSUPPORTED UPGRADE ", "============================================================", "", "==> Processing phase `configuration_phase`", "====> * ipu_workflow_config", " IPU workflow config actor", "==> Processing phase `FactsCollection`", "====> * get_enabled_modules", " Provides data about which module streams are enabled on the source system.", "====> * storage_scanner", " Provides data about storage settings.", "====> * transaction_workarounds", " Provides additional RPM transaction tasks based on bundled RPM packages.", "====> * scan_kernel_cmdline", " No documentation has been provided for the scan_kernel_cmdline actor.", "====> * repository_mapping", " Produces message containing repository mapping based on provided file.", "====> * scan_systemd_source", " Provides info about systemd on the source system", "====> * system_facts", " Provides data about many facts from system.", "====> * root_scanner", " Scan the system root directory and produce a message containing", "====> * scanclienablerepo", " Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.", "====> * scan_files_for_target_userspace", " Scan the source system and identify files that will be copied into the target userspace when it is created.", "====> * rpm_scanner", " Provides data about installed RPM Packages.", "Loaded plugins: product-id, subscription-manager", "", "This system is not registered with an entitlement server. You can use subscription-manager to register.", "", "====> * trusted_gpg_keys_scanner", " Scan for trusted GPG keys.", "====> * scan_grub_config", " Scan grub configuration files for errors.", "====> * scan_subscription_manager_info", " Scans the current system for subscription manager information", "====> * common_leapp_dracut_modules", " Influences the generation of the initram disk", "====> * scan_custom_modifications_actor", " Collects information about files in leapp directories that have been modified or newly added.", "====> * register_yum_adjustment", " Registers a workaround which will adjust the yum directories during the upgrade.", "====> * source_boot_loader_scanner", " Scans the boot loader configuration on the source system.", "====> * scan_custom_repofile", " Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.", "====> * check_grub_legacy", " Check whether GRUB Legacy is installed in the MBR.", "====> * load_device_driver_deprecation_data", " Loads deprecation data for drivers and devices (PCI & CPU)", "====> * removed_pam_modules_scanner", " Scan PAM configuration for modules that are not available in RHEL-8.", "====> * scan_target_os_image", " Scans the provided target OS ISO image to use as a content source for the IPU, if any.", "====> * read_openssh_config", " Collect information about the OpenSSH configuration.", "====> * scanmemory", " Scan Memory of the machine.", "====> * scan_fips", " Determine whether the source system has FIPS enabled.", "====> * pci_devices_scanner", " Provides data about existing PCI Devices.", "====> * network_manager_read_config", " Provides data about NetworkManager configuration.", "====> * detect_kernel_drivers", " Matches all currently loaded kernel drivers against known deprecated and removed drivers.", "====> * persistentnetnames", " Get network interface information for physical ethernet interfaces of the original system.", "====> * sctp_read_status", " Determines whether or not the SCTP kernel module might be wanted.", "====> * tcp_wrappers_config_read", " Parse tcp_wrappers configuration files /etc/hosts.{allow,deny}.", "====> * distribution_signed_rpm_scanner", " Provide data about distribution signed & unsigned RPM packages.", "====> * checkrhui", " Check if system is using RHUI infrastructure (on public cloud) and send messages to", "====> * scan_grub_device_name", " Find the name of the block devices where GRUB is located", "====> * scan_grub_device_partition_layout", " Scan all identified GRUB devices for their partition layout.", "====> * biosdevname", " Enable biosdevname on the target RHEL system if all interfaces on the source RHEL", "====> * authselect_scanner", " Detect what authselect configuration should be suggested to administrator.", "====> * scan_source_kernel", " Scan the source system kernel.", "====> * xfs_info_scanner", " This actor scans all mounted mountpoints for XFS information", "====> * persistentnetnamesdisable", " Disable systemd-udevd persistent network naming on machine with single eth0 NIC", "====> * used_repository_scanner", " Scan used enabled repositories", "====> * vsftpd_config_read", " Reads vsftpd configuration files (/etc/vsftpd/*.conf) and extracts necessary information.", "====> * copy_dnf_conf_into_target_userspace", " Copy dnf.conf into target userspace", "====> * scan_pkg_manager", " Provides data about package manager (yum/dnf)", "====> * sssd_facts", " Check SSSD configuration for changes in RHEL8 and report them in model.", "====> * scan_sap_hana", " Gathers information related to SAP HANA instances on the system.", "====> * get_installed_desktops", " Actor checks if kde or gnome desktop environments", "====> * pam_modules_scanner", " Scan the pam directory for services and modules used in them", "====> * scan_source_files", " Scan files (explicitly specified) of the source system.", "====> * selinuxcontentscanner", " Scan the system for any SELinux customizations", "====> * scandasd", " In case of s390x architecture, check whether DASD is used.", "====> * firewalld_facts_actor", " Provide data about firewalld", "====> * scanzfcp", " In case of s390x architecture, check whether ZFCP is used.", "====> * quagga_daemons", " Active quagga daemons check.", "====> * remove_obsolete_gpg_keys", " Remove obsoleted RPM GPG keys.", "====> * udevadm_info", " Produces data exported by the \"udevadm info\" command.", "====> * satellite_upgrade_facts", " Report which Satellite packages require updates and how to handle PostgreSQL data", "====> * scancpu", " Scan CPUs of the machine.", "====> * cups_scanner", " Gather facts about CUPS features which needs to be migrated", "====> * repositories_blacklist", " Exclude target repositories provided by Red Hat without support.", "====> * check_kde_apps", " Actor checks which KDE apps are installed.", "====> * rpm_transaction_config_tasks_collector", " Provides additional RPM transaction tasks from /etc/leapp/transaction.", "====> * ipa_scanner", " Scan system for ipa-client and ipa-server status", "====> * spamassassin_config_read", " Reads spamc configuration (/etc/mail/spamassassin/spamc.conf), the", "====> * scan_dynamic_linker_configuration", " Scan the dynamic linker configuration and find modifications.", "====> * multipath_conf_read", " Read multipath configuration files and extract the necessary information", "====> * pes_events_scanner", " Provides data about package events from Package Evolution Service.", "====> * setuptargetrepos", " Produces list of repositories that should be available to be used by Upgrade process.", "==> Processing phase `Checks`", "====> * unsupported_upgrade_check", " Checks environment variables and produces a warning report if the upgrade is unsupported.", "====> * checkgrep", " Check if Grep is installed. If yes, write information about non-compatible changes.", "====> * check_cifs", " Check if CIFS filesystem is in use. If yes, inhibit the upgrade process.", "====> * check_root_symlinks", " Check if the symlinks /bin and /lib are relative, not absolute.", "====> * check_sap_hana", " If SAP HANA has been detected, several checks are performed to ensure a successful upgrade.", "====> * checktargetrepos", " Check whether target yum repositories are specified.", "====> * check_ntp", " Check if ntp and/or ntpdate configuration needs to be migrated.", "====> * check_mount_options", " Check for mount options preventing the upgrade.", "====> * python_inform_user", " This actor informs the user of differences in Python version and support in RHEL 8.", "====> * red_hat_signed_rpm_check", " Check if there are packages not signed by Red Hat in use. If yes, warn user about it.", "====> * check_rhsmsku", " Ensure the system is subscribed to the subscription manager", "====> * bacula_check", " Actor checking for presence of Bacula installation.", "====> * multipath_conf_check", " Checks whether the multipath configuration can be updated to RHEL-8 and", "====> * multiple_package_versions", " Check for problematic 32bit packages installed together with 64bit ones.", "====> * checkmemory", " The actor check the size of RAM against RHEL8 minimal hardware requirements", "====> * vsftpd_config_check", " Checks whether the vsftpd configuration is supported in RHEL-8. Namely checks that", "====> * check_nfs", " Check if NFS filesystem is in use. If yes, inhibit the upgrade process.", "====> * check_yum_plugins_enabled", " Checks that the required yum plugins are enabled.", "====> * check_first_partition_offset", " Check whether the first partition starts at the offset >=1MiB.", "====> * check_custom_modifications_actor", " Checks CustomModifications messages and produces a report about files in leapp directories that have been", "====> * quagga_report", " Checking for babeld on RHEL-7.", "====> * sssd_check", " Check SSSD configuration for changes in RHEL8 and report them.", "====> * check_ipa_server", " Check for ipa-server and inhibit upgrade", "====> * check_docker", " Checks if Docker is installed and warns about its deprecation in RHEL8.", "====> * zipl_check_boot_entries", " Inhibits the upgrade if a problematic Zipl configuration is detected on the system.", "====> * powertop", " Check if PowerTOP is installed. If yes, write information about non-compatible changes.", "====> * check_boot_avail_space", " Check if at least 100Mib of available space on /boot. If not, inhibit the upgrade process.", "====> * removed_pam_modules", " Check for modules that are not available in RHEL 8 anymore", "====> * open_ssh_deprecated_directives_check", " Check for any deprecated directives in the OpenSSH configuration.", "====> * check_grub_core", " Check whether we are on legacy (BIOS) system and instruct Leapp to upgrade GRUB core", "====> * spamassassin_config_check", " Reports changes in spamassassin between RHEL-7 and RHEL-8", "====> * check_openssl_conf", " Check whether the openssl configuration and openssl-IBMCA.", "====> * check_fstab_mount_order", " Checks order of entries in /etc/fstab based on their mount point and inhibits upgrade if overshadowing is detected.", "====> * check_systemd_broken_symlinks", " Check whether some systemd symlinks are broken", "====> * check_insights_auto_register", " Checks if system can be automatically registered into Red Hat Insights", "====> * removed_pam_modules_check", " Check if it is all right to disable PAM modules that are not in RHEL-8.", "====> * postgresql_check", " Actor checking for presence of PostgreSQL installation.", "====> * check_os_release", " Check if the current RHEL minor version is supported. If not, inhibit the upgrade process.", "====> * cups_check", " Reports changes in configuration between CUPS 1.6.3 and 2.2.6", "====> * check_installed_kernels", " Inhibit IPU (in-place upgrade) when installed kernels conflict with a safe upgrade.", "====> * openssh_permit_root_login", " OpenSSH no longer allows root logins with password.", "====> * check_brltty", " Check if brltty is installed, check whether configuration update is needed.", "====> * sctp_checks", " Parses collected SCTP information and take necessary actions.", "====> * check_sendmail", " Check if sendmail is installed, check whether configuration update is needed, inhibit upgrade if TCP wrappers", "====> * checkacpid", " Check if acpid is installed. If yes, write information about non-compatible changes.", "====> * checkhybridimage", " Check if the system is using Azure hybrid image.", "====> * check_detected_devices_and_drivers", " Checks whether or not detected devices and drivers are usable on the target system.", "====> * checkfstabxfsoptions", " Check the FSTAB file for the deprecated / removed XFS mount options.", "====> * cephvolumescan", " Retrieves the list of encrypted Ceph OSD", "====> * check_luks_and_inhibit", " Check if any encrypted partitions is in use. If yes, inhibit the upgrade process.", "====> * check_chrony", " Check for incompatible changes in chrony configuration.", "====> * check_dynamic_linker_configuration", " Check for customization of dynamic linker configuration.", "====> * tcp_wrappers_check", " Check the list of packages previously compiled with TCP wrappers support", "====> * check_consumed_assets", " Check whether Leapp is using correct data assets.", "====> * check_removed_envvars", " Check for usage of removed environment variables and inhibit the upgrade", "====> * checkdosfstools", " Check if dosfstools is installed. If yes, write information about non-compatible changes.", "====> * check_firewalld", " Check for certain firewalld configuration that may prevent an upgrade.", "====> * check_installed_devel_kernels", " Inhibit IPU (in-place upgrade) when multiple devel kernels are installed.", "====> * check_memcached", " Check for incompatible changes in memcached configuration.", "====> * check_kde_gnome", " Checks whether KDE is installed", "====> * check_wireshark", " Report a couple of changes in tshark usage", "====> * check_skipped_repositories", " Produces a report if any repositories enabled on the system are going to be skipped.", "====> * check_fips", " Inhibit upgrade if FIPS is detected as enabled.", "====> * check_bind", " Actor parsing BIND configuration and checking for known issues in it.", "====> * open_ssh_algorithms", " OpenSSH configuration does not contain any unsupported cryptographic algorithms.", "====> * check_se_linux", " Check SELinux status and produce decision messages for further action.", "====> * efi_check_boot", " Adjust EFI boot entry for first reboot", "====> * detect_grub_config_error", " Check grub configuration for various errors.", "====> * authselect_check", " Confirm suggested authselect call from AuthselectScanner.", "====> * check_btrfs", " Check if Btrfs filesystem is in use. If yes, inhibit the upgrade process.", "====> * check_installed_debug_kernels", " Inhibit IPU (in-place upgrade) when multiple debug kernels are installed.", "====> * open_ssh_protocol", " Protocol configuration option was removed.", "====> * check_persistent_mounts", " Check if mounts required to be persistent are mounted in persistent fashion.", "====> * check_target_iso", " Check that the provided target ISO is a valid ISO image and is located on a persistent partition.", "====> * open_ssh_use_privilege_separation", " UsePrivilegeSeparation configuration option was removed.", "====> * check_etc_releasever", " Check releasever info and provide a guidance based on the facts", "====> * satellite_upgrade_check", " Check state of Satellite system before upgrade", "====> * check_ha_cluster", " Check if HA Cluster is in use. If yes, inhibit the upgrade process.", "====> * check_postfix", " Check if postfix is installed, check whether configuration update is needed.", "====> * checkirssi", " Check if irssi is installed. If yes, write information about non-compatible changes.", "====> * enable_device_cio_free_service", " Enables device_cio_free.service systemd service on s390x", "====> * check_system_arch", " Check if system is running at a supported architecture. If no, inhibit the upgrade process.", "====> * check_rpm_transaction_events", " Filter RPM transaction events based on installed RPM packages", "====> * check_skip_phase", " Skip all the subsequent phases until the report phase.", "==> Processing phase `Reports`", "====> * verify_check_results", " Check all dialogs and notify that user needs to make some choices.", "====> * verify_check_results", " Check all generated results messages and notify user about them.", "", "Debug output written to /var/log/leapp/leapp-preupgrade.log", "", "============================================================", " REPORT OVERVIEW ", "============================================================", "", "Upgrade has been inhibited due to the following problems:", " 1. Use of CIFS detected. Upgrade can't proceed", " 2. Use of NFS detected. Upgrade can't proceed", " 3. Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", "", "HIGH and MEDIUM severity reports:", " 1. Packages available in excluded repositories will not be installed", " 2. Upgrade is unsupported", " 3. Difference in Python versions and support in RHEL 8", " 4. GRUB2 core will be automatically updated during the upgrade", " 5. Module pam_pkcs11 will be removed from PAM configuration", " 6. chrony using default configuration", "", "Reports summary:", " Errors: 0", " Inhibitors: 3", " HIGH severity reports: 4", " MEDIUM severity reports: 2", " LOW severity reports: 5", " INFO severity reports: 3", "", "Before continuing, review the full report below for details about discovered problems and possible remediation instructions:", " A report has been generated at /var/log/leapp/leapp-report.txt", " A report has been generated at /var/log/leapp/leapp-report.json", "", "============================================================", " END OF REPORT OVERVIEW ", "============================================================", "", "Answerfile has been generated at /var/log/leapp/answerfile"]} TASK [analysis-leapp | Include custom_local_repos for local_repos_post_analysis] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:86 TASK [infra.leapp.common : custom_local_repos | Remove old /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:2 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : custom_local_repos | Validate repo definitions have baseurl or metalink] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:9 skipping: [managed-node01] => {"changed": false, "skipped_reason": "No items in the list"} TASK [infra.leapp.common : custom_local_repos | Enable custom upgrade yum repositories] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:16 skipping: [managed-node01] => {"changed": false, "skipped_reason": "No items in the list"} TASK [analysis-leapp | Restore original Satellite activation key] ************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:96 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : analysis-leapp | Include check-results-file.yml] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:107 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/check-results-file.yml for managed-node01 TASK [infra.leapp.analysis : check-results-file | Result file status] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/check-results-file.yml:2 ok: [managed-node01] => {"changed": false, "stat": {"atime": 1771331680.3538394, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 32, "charset": "us-ascii", "checksum": "78f8360dbf9927ad8b6af90ebf8049bccb42ccb9", "ctime": 1771331680.3538394, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 360710225, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1771331680.3538394, "nlink": 1, "path": "/var/log/leapp/leapp-report.txt", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 12827, "uid": 0, "version": "18446744072370194383", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} TASK [infra.leapp.analysis : check-results-file | Check that result file exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/check-results-file.yml:7 ok: [managed-node01] => { "changed": false, "msg": "All assertions passed" } TASK [analysis-leapp | Run parse_leapp_report to check for inhibitors] ********* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:110 TASK [infra.leapp.common : parse_leapp_report | Default upgrade_inhibited to false] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:12 ok: [managed-node01] => {"ansible_facts": {"upgrade_inhibited": false}, "changed": false} TASK [infra.leapp.common : parse_leapp_report | Collect human readable report results] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:16 ok: [managed-node01] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} TASK [infra.leapp.common : parse_leapp_report | Collect JSON report results] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:22 ok: [managed-node01] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} TASK [infra.leapp.common : parse_leapp_report | Parse report results] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:28 ok: [managed-node01] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} TASK [infra.leapp.common : parse_leapp_report | Clear leapp_inhibitors] ******** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:35 ok: [managed-node01] => {"ansible_facts": {"leapp_inhibitors": []}, "changed": false} TASK [infra.leapp.common : parse_leapp_report | Check for inhibitors] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:39 skipping: [managed-node01] => (item={'groups': ['repository', 'failure'], 'title': 'Excluded target system repositories', 'timeStamp': '2026-02-17T12:34:33.252484Z', 'hostname': 'managed-node01', 'detail': {'remediations': [{'type': 'hint', 'context': 'If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).'}]}, 'actor': 'repositories_blacklist', 'summary': 'The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms', 'audience': 'sysadmin', 'key': '1b9132cb2362ae7830e48eee7811be9527747de8', 'id': '04659fc8822a30c5588d4f89f59ac3de0abce744c22f9d3291b9aa13299794f8', 'severity': 'info'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "repositories_blacklist", "audience": "sysadmin", "detail": {"remediations": [{"context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "type": "hint"}]}, "groups": ["repository", "failure"], "hostname": "managed-node01", "id": "04659fc8822a30c5588d4f89f59ac3de0abce744c22f9d3291b9aa13299794f8", "key": "1b9132cb2362ae7830e48eee7811be9527747de8", "severity": "info", "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms", "timeStamp": "2026-02-17T12:34:33.252484Z", "title": "Excluded target system repositories"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['repository'], 'title': 'Packages available in excluded repositories will not be installed', 'timeStamp': '2026-02-17T12:34:35.464277Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'python3-pyxattr'}, {'scheme': 'package', 'title': 'rpcgen'}]}, 'actor': 'pes_events_scanner', 'summary': '2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled "Excluded target system repositories" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)', 'audience': 'sysadmin', 'key': '2437e204808f987477c0e9be8e4c95b3a87a9f3e', 'id': '5453f32bddcfacbb396d55125e22736beb4239d202357a1462028a4f4c969689', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "pes_events_scanner", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "python3-pyxattr"}, {"scheme": "package", "title": "rpcgen"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "5453f32bddcfacbb396d55125e22736beb4239d202357a1462028a4f4c969689", "key": "2437e204808f987477c0e9be8e4c95b3a87a9f3e", "severity": "high", "summary": "2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", "timeStamp": "2026-02-17T12:34:35.464277Z", "title": "Packages available in excluded repositories will not be installed"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['upgrade process', 'sanity'], 'title': 'Upgrade is unsupported', 'timeStamp': '2026-02-17T12:34:35.633999Z', 'hostname': 'managed-node01', 'actor': 'unsupported_upgrade_check', 'summary': 'Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.\n', 'audience': 'sysadmin', 'key': '9e5088e3c1f371e020ec777c3d86578f4be143cf', 'id': '9af63c73418705903733f1f312a6c1b1710898d7db894e6176c3a1102cae37c8', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "unsupported_upgrade_check", "audience": "sysadmin", "groups": ["upgrade process", "sanity"], "hostname": "managed-node01", "id": "9af63c73418705903733f1f312a6c1b1710898d7db894e6176c3a1102cae37c8", "key": "9e5088e3c1f371e020ec777c3d86578f4be143cf", "severity": "high", "summary": "Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.\n", "timeStamp": "2026-02-17T12:34:35.633999Z", "title": "Upgrade is unsupported"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['tools'], 'title': 'Grep has incompatible changes in the next major version', 'timeStamp': '2026-02-17T12:34:35.714846Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'grep'}], 'remediations': [{'type': 'hint', 'context': 'Please update your scripts to be compatible with the changes.'}]}, 'actor': 'checkgrep', 'summary': 'If a file contains data improperly encoded for the current locale, and this is discovered before any of the file\'s contents are output, grep now treats the file as binary.\nThe \'grep -P\' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.\nIn locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.\nWhen searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.\nThe \'grep -z\' no longer automatically treats the byte \'\\200\' as binary data.\nContext no longer excludes selected lines omitted because of -m. For example, \'grep "^" -m1 -A1\' now outputs the first two input lines, not just the first line.\n', 'audience': 'sysadmin', 'key': '94665a499e2eeee35eca3e7093a7abe183384b16', 'id': 'a1ebe612c4dfa1b9f271088b3d1c0de960d4ffddb6cf0f54304c3b4f11f9c71c', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "checkgrep", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "grep"}], "remediations": [{"context": "Please update your scripts to be compatible with the changes.", "type": "hint"}]}, "groups": ["tools"], "hostname": "managed-node01", "id": "a1ebe612c4dfa1b9f271088b3d1c0de960d4ffddb6cf0f54304c3b4f11f9c71c", "key": "94665a499e2eeee35eca3e7093a7abe183384b16", "severity": "low", "summary": "If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.\nThe 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.\nIn locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.\nWhen searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.\nThe 'grep -z' no longer automatically treats the byte '\\200' as binary data.\nContext no longer excludes selected lines omitted because of -m. For example, 'grep \"^\" -m1 -A1' now outputs the first two input lines, not just the first line.\n", "timeStamp": "2026-02-17T12:34:35.714846Z", "title": "Grep has incompatible changes in the next major version"}, "skip_reason": "Conditional result was False"} ok: [managed-node01] => (item={'groups': ['filesystem', 'network', 'inhibitor'], 'title': "Use of CIFS detected. Upgrade can't proceed", 'timeStamp': '2026-02-17T12:34:35.757145Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'file', 'title': '/etc/fstab'}], 'external': [{'url': 'https://access.redhat.com/solutions/6964304', 'title': 'Leapp upgrade failed with error "Inhibitor: Use of CIFS detected. Upgrade cannot proceed"'}], 'remediations': [{'type': 'hint', 'context': 'Comment out CIFS entries to proceed with the upgrade.'}]}, 'actor': 'check_cifs', 'summary': 'CIFS is currently not supported by the inplace upgrade.', 'audience': 'sysadmin', 'key': 'd0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a', 'id': 'f50613dba17a3a40b51dc97c95d254a3ecd0b55eda7bdf3b2af0c9a1eeb1eb0c', 'severity': 'high'}) => {"ansible_facts": {"leapp_inhibitors": [{"actor": "check_cifs", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "f50613dba17a3a40b51dc97c95d254a3ecd0b55eda7bdf3b2af0c9a1eeb1eb0c", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2026-02-17T12:34:35.757145Z", "title": "Use of CIFS detected. Upgrade can't proceed"}], "upgrade_inhibited": true}, "ansible_loop_var": "item", "changed": false, "item": {"actor": "check_cifs", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "f50613dba17a3a40b51dc97c95d254a3ecd0b55eda7bdf3b2af0c9a1eeb1eb0c", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2026-02-17T12:34:35.757145Z", "title": "Use of CIFS detected. Upgrade can't proceed"}} skipping: [managed-node01] => (item={'groups': ['python'], 'title': 'Difference in Python versions and support in RHEL 8', 'timeStamp': '2026-02-17T12:34:36.109854Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'python'}, {'scheme': 'package', 'title': 'python2'}, {'scheme': 'package', 'title': 'python3'}], 'external': [{'url': 'https://red.ht/rhel-8-python', 'title': 'Difference in Python versions and support in RHEL 8'}], 'remediations': [{'type': 'hint', 'context': 'Please run "alternatives --set python /usr/bin/python3" after upgrade'}]}, 'actor': 'python_inform_user', 'summary': "In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", 'audience': 'developer', 'key': '0c98585b1d8d252eb540bf61560094f3495351f5', 'id': 'f41c3b70954e39d972457a5123f4588429813af4202df89eb6f4e2fadbf123f2', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "python_inform_user", "audience": "developer", "detail": {"external": [{"title": "Difference in Python versions and support in RHEL 8", "url": "https://red.ht/rhel-8-python"}], "related_resources": [{"scheme": "package", "title": "python"}, {"scheme": "package", "title": "python2"}, {"scheme": "package", "title": "python3"}], "remediations": [{"context": "Please run \"alternatives --set python /usr/bin/python3\" after upgrade", "type": "hint"}]}, "groups": ["python"], "hostname": "managed-node01", "id": "f41c3b70954e39d972457a5123f4588429813af4202df89eb6f4e2fadbf123f2", "key": "0c98585b1d8d252eb540bf61560094f3495351f5", "severity": "high", "summary": "In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", "timeStamp": "2026-02-17T12:34:36.109854Z", "title": "Difference in Python versions and support in RHEL 8"}, "skip_reason": "Conditional result was False"} ok: [managed-node01] => (item={'groups': ['filesystem', 'network', 'inhibitor'], 'title': "Use of NFS detected. Upgrade can't proceed", 'timeStamp': '2026-02-17T12:34:36.642637Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'file', 'title': '/etc/fstab'}], 'external': [{'url': 'https://access.redhat.com/solutions/6964006', 'title': 'Why does leapp upgrade fail on detecting NFS during upgrade?'}], 'remediations': [{'type': 'hint', 'context': 'Disable NFS temporarily for the upgrade if possible.'}]}, 'actor': 'check_nfs', 'summary': 'NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n', 'audience': 'sysadmin', 'key': '9881b25faceeeaa7a6478bcdac29afd7f6baaaed', 'id': '04749fbd44a55cd8c638dc8ece4e339fb5c0f11ef73af006a53e34491377c1a6', 'severity': 'high'}) => {"ansible_facts": {"leapp_inhibitors": [{"actor": "check_cifs", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "f50613dba17a3a40b51dc97c95d254a3ecd0b55eda7bdf3b2af0c9a1eeb1eb0c", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2026-02-17T12:34:35.757145Z", "title": "Use of CIFS detected. Upgrade can't proceed"}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "04749fbd44a55cd8c638dc8ece4e339fb5c0f11ef73af006a53e34491377c1a6", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2026-02-17T12:34:36.642637Z", "title": "Use of NFS detected. Upgrade can't proceed"}], "upgrade_inhibited": true}, "ansible_loop_var": "item", "changed": false, "item": {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "04749fbd44a55cd8c638dc8ece4e339fb5c0f11ef73af006a53e34491377c1a6", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2026-02-17T12:34:36.642637Z", "title": "Use of NFS detected. Upgrade can't proceed"}} skipping: [managed-node01] => (item={'groups': ['boot'], 'title': 'GRUB2 core will be automatically updated during the upgrade', 'timeStamp': '2026-02-17T12:34:37.281582Z', 'hostname': 'managed-node01', 'actor': 'check_grub_core', 'summary': 'On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running "grub2-install" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.', 'audience': 'sysadmin', 'key': 'ac7030e05d2ee248d34f08a9fa040b352bc410a3', 'id': '8f5dba2813db9aac19520c8f7b32daa9b2168f9fa0d745f433873b327bf22522', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_grub_core", "audience": "sysadmin", "groups": ["boot"], "hostname": "managed-node01", "id": "8f5dba2813db9aac19520c8f7b32daa9b2168f9fa0d745f433873b327bf22522", "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", "severity": "high", "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", "timeStamp": "2026-02-17T12:34:37.281582Z", "title": "GRUB2 core will be automatically updated during the upgrade"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['filesystem'], 'title': 'Detected broken systemd symlinks for non-existing services', 'timeStamp': '2026-02-17T12:34:37.444041Z', 'hostname': 'managed-node01', 'detail': {'remediations': [{'type': 'hint', 'context': 'Remove the invalid symlinks before the upgrade.'}, {'type': 'command', 'context': ['/usr/bin/rm', '/etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service']}]}, 'actor': 'check_systemd_broken_symlinks', 'summary': 'Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:\n - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service', 'audience': 'sysadmin', 'key': 'be2083fee03f5f0a708fd193d82d2fe20aee7217', 'id': '86ac24f12fa9e1e11a1add6addbb2082ff8c75f97ec3e0bd626f84da05af4ec0', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_systemd_broken_symlinks", "audience": "sysadmin", "detail": {"remediations": [{"context": "Remove the invalid symlinks before the upgrade.", "type": "hint"}, {"context": ["/usr/bin/rm", "/etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service"], "type": "command"}]}, "groups": ["filesystem"], "hostname": "managed-node01", "id": "86ac24f12fa9e1e11a1add6addbb2082ff8c75f97ec3e0bd626f84da05af4ec0", "key": "be2083fee03f5f0a708fd193d82d2fe20aee7217", "severity": "low", "summary": "Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:\n - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", "timeStamp": "2026-02-17T12:34:37.444041Z", "title": "Detected broken systemd symlinks for non-existing services"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['authentication', 'security', 'tools'], 'title': 'Module pam_pkcs11 will be removed from PAM configuration', 'timeStamp': '2026-02-17T12:34:37.613182Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'sssd'}], 'remediations': [{'type': 'hint', 'context': 'Configure SSSD to replace pam_pkcs11'}]}, 'actor': 'removed_pam_modules_check', 'summary': 'Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.', 'audience': 'sysadmin', 'key': 'bf47e7305d6805e8bbeaa7593cf01e38030c23f3', 'id': 'a168f059f20590ab8bbfa21ebdc2aa0798236f14d39cc459825bbc6bbbdc31a5', 'severity': 'medium'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "removed_pam_modules_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "sssd"}], "remediations": [{"context": "Configure SSSD to replace pam_pkcs11", "type": "hint"}]}, "groups": ["authentication", "security", "tools"], "hostname": "managed-node01", "id": "a168f059f20590ab8bbfa21ebdc2aa0798236f14d39cc459825bbc6bbbdc31a5", "key": "bf47e7305d6805e8bbeaa7593cf01e38030c23f3", "severity": "medium", "summary": "Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.", "timeStamp": "2026-02-17T12:34:37.613182Z", "title": "Module pam_pkcs11 will be removed from PAM configuration"}, "skip_reason": "Conditional result was False"} ok: [managed-node01] => (item={'groups': ['kernel', 'drivers', 'inhibitor'], 'title': 'Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.', 'timeStamp': '2026-02-17T12:34:38.364045Z', 'hostname': 'managed-node01', 'detail': {'external': [{'url': 'https://access.redhat.com/solutions/6971716', 'title': 'Leapp preupgrade getting "Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed." '}, {'url': 'https://access.redhat.com/solutions/5436131', 'title': 'Leapp upgrade fail with error "Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."'}]}, 'actor': 'check_detected_devices_and_drivers', 'summary': 'Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n - tulip\n', 'audience': 'sysadmin', 'key': 'f08a07da902958defa4f5c2699fae9ec2eb67c5b', 'id': 'c315e4f0f3557c1aa48f0a0b53a7e34f2124a802d0be0908cc3f0a5022403f71', 'severity': 'high'}) => {"ansible_facts": {"leapp_inhibitors": [{"actor": "check_cifs", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "f50613dba17a3a40b51dc97c95d254a3ecd0b55eda7bdf3b2af0c9a1eeb1eb0c", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2026-02-17T12:34:35.757145Z", "title": "Use of CIFS detected. Upgrade can't proceed"}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "04749fbd44a55cd8c638dc8ece4e339fb5c0f11ef73af006a53e34491377c1a6", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2026-02-17T12:34:36.642637Z", "title": "Use of NFS detected. Upgrade can't proceed"}, {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "c315e4f0f3557c1aa48f0a0b53a7e34f2124a802d0be0908cc3f0a5022403f71", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n - tulip\n", "timeStamp": "2026-02-17T12:34:38.364045Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}], "upgrade_inhibited": true}, "ansible_loop_var": "item", "changed": false, "item": {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "c315e4f0f3557c1aa48f0a0b53a7e34f2124a802d0be0908cc3f0a5022403f71", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n - tulip\n", "timeStamp": "2026-02-17T12:34:38.364045Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}} skipping: [managed-node01] => (item={'groups': ['services', 'time management'], 'title': 'chrony using default configuration', 'timeStamp': '2026-02-17T12:34:38.639913Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'ntpd'}, {'scheme': 'package', 'title': 'chrony'}, {'scheme': 'file', 'title': '/etc/chrony.conf'}]}, 'actor': 'check_chrony', 'summary': 'default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives', 'audience': 'sysadmin', 'key': 'c4222ebd18730a76f6bc7b3b66df898b106e6554', 'id': '8977de10c5795636eb08c58bd6a3d940287c3b6061ffa09b896d5c2fd1236d3d', 'severity': 'medium'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_chrony", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "ntpd"}, {"scheme": "package", "title": "chrony"}, {"scheme": "file", "title": "/etc/chrony.conf"}]}, "groups": ["services", "time management"], "hostname": "managed-node01", "id": "8977de10c5795636eb08c58bd6a3d940287c3b6061ffa09b896d5c2fd1236d3d", "key": "c4222ebd18730a76f6bc7b3b66df898b106e6554", "severity": "medium", "summary": "default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives", "timeStamp": "2026-02-17T12:34:38.639913Z", "title": "chrony using default configuration"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['repository'], 'title': 'Some enabled RPM repositories are unknown to Leapp', 'timeStamp': '2026-02-17T12:34:39.242563Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'libsolv'}, {'scheme': 'package', 'title': 'python-perf'}, {'scheme': 'package', 'title': 'kernel-tools-libs'}, {'scheme': 'package', 'title': 'libreport-filesystem'}, {'scheme': 'package', 'title': 'json-glib'}, {'scheme': 'package', 'title': 'librepo'}, {'scheme': 'package', 'title': 'kernel-tools'}, {'scheme': 'repository', 'title': 'rhel'}], 'remediations': [{'type': 'hint', 'context': 'You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket'}]}, 'actor': 'check_skipped_repositories', 'summary': 'The following repositories with Red Hat-signed packages are unknown to Leapp:\n- rhel\nAnd the following packages installed from those repositories may not be upgraded:\n- libsolv\n- python-perf\n- kernel-tools-libs\n- libreport-filesystem\n- json-glib\n- librepo\n- kernel-tools', 'audience': 'sysadmin', 'key': '8e89e20c645cea600b240156071d81c64daab7ad', 'id': '27ffa6faeb9b7107a4566ab722c7ae3a51dc70d5bc441a86bea972dbb81062ac', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_skipped_repositories", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "libsolv"}, {"scheme": "package", "title": "python-perf"}, {"scheme": "package", "title": "kernel-tools-libs"}, {"scheme": "package", "title": "libreport-filesystem"}, {"scheme": "package", "title": "json-glib"}, {"scheme": "package", "title": "librepo"}, {"scheme": "package", "title": "kernel-tools"}, {"scheme": "repository", "title": "rhel"}], "remediations": [{"context": "You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket", "type": "hint"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "27ffa6faeb9b7107a4566ab722c7ae3a51dc70d5bc441a86bea972dbb81062ac", "key": "8e89e20c645cea600b240156071d81c64daab7ad", "severity": "low", "summary": "The following repositories with Red Hat-signed packages are unknown to Leapp:\n- rhel\nAnd the following packages installed from those repositories may not be upgraded:\n- libsolv\n- python-perf\n- kernel-tools-libs\n- libreport-filesystem\n- json-glib\n- librepo\n- kernel-tools", "timeStamp": "2026-02-17T12:34:39.242563Z", "title": "Some enabled RPM repositories are unknown to Leapp"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['selinux', 'security'], 'title': 'SElinux relabeling will be scheduled', 'timeStamp': '2026-02-17T12:34:39.437613Z', 'hostname': 'managed-node01', 'actor': 'check_se_linux', 'summary': 'SElinux relabeling will be scheduled as the status is permissive/enforcing.', 'audience': 'sysadmin', 'key': '8fb81863f8413bd617c2a55b69b8e10ff03d7c72', 'id': '841dc72666511da38449139ee12352abccebcc3cc586b677669a04132ca1d40b', 'severity': 'info'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_se_linux", "audience": "sysadmin", "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "841dc72666511da38449139ee12352abccebcc3cc586b677669a04132ca1d40b", "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", "severity": "info", "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", "timeStamp": "2026-02-17T12:34:39.437613Z", "title": "SElinux relabeling will be scheduled"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['selinux', 'security'], 'title': 'SElinux will be set to permissive mode', 'timeStamp': '2026-02-17T12:34:39.441721Z', 'hostname': 'managed-node01', 'detail': {'remediations': [{'type': 'hint', 'context': 'Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the "/root/tmp_leapp_py3" SElinux warnings.'}]}, 'actor': 'check_se_linux', 'summary': 'SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.', 'audience': 'sysadmin', 'key': '39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f', 'id': 'f0aebba34fe9188fe242053563cda70584c9cf70ec2c5b8bde946b73b961750a', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_se_linux", "audience": "sysadmin", "detail": {"remediations": [{"context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.", "type": "hint"}]}, "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "f0aebba34fe9188fe242053563cda70584c9cf70ec2c5b8bde946b73b961750a", "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", "severity": "low", "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", "timeStamp": "2026-02-17T12:34:39.441721Z", "title": "SElinux will be set to permissive mode"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['authentication', 'security', 'tools'], 'title': 'Current PAM and nsswitch.conf configuration will be kept.', 'timeStamp': '2026-02-17T12:34:39.546072Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'authselect'}, {'scheme': 'package', 'title': 'authconfig'}, {'scheme': 'file', 'title': '/etc/nsswitch.conf'}]}, 'actor': 'authselect_check', 'summary': 'There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.', 'audience': 'sysadmin', 'key': '40c4ab1da4a30dc1ca40e543f6385e1336d8810c', 'id': '046764b0a89ca99eb7b215c3158a156f8993d6548b3b8d8ba0f3ef20478d6416', 'severity': 'info'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "authselect_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "authselect"}, {"scheme": "package", "title": "authconfig"}, {"scheme": "file", "title": "/etc/nsswitch.conf"}]}, "groups": ["authentication", "security", "tools"], "hostname": "managed-node01", "id": "046764b0a89ca99eb7b215c3158a156f8993d6548b3b8d8ba0f3ef20478d6416", "key": "40c4ab1da4a30dc1ca40e543f6385e1336d8810c", "severity": "info", "summary": "There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.", "timeStamp": "2026-02-17T12:34:39.546072Z", "title": "Current PAM and nsswitch.conf configuration will be kept."}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['services', 'email'], 'title': 'Postfix has incompatible changes in the next major version', 'timeStamp': '2026-02-17T12:34:39.966466Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'postfix'}]}, 'actor': 'check_postfix', 'summary': 'Postfix 3.x has so called "compatibility safety net" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.\nThe backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.\nIt can be turned on by running: "postconf -e compatibility_level=0\nIt can be turned off by running: "postconf -e compatibility_level=2\n\nIn the Postfix MySQL database client, the default "option_group" value has changed to "client", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set "option_group" to the empty string.\n\nThe postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.\n\nPostfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to "auto", and introduces a new parameter "tls_eecdh_auto_curves" with the names of curves that may be negotiated.\n\nThe "master.cf" chroot default value has changed from "y" (yes) to "n" (no). This applies to master.cf services where chroot field is not explicitly specified.\n\nThe "append_dot_mydomain" default value has changed from "yes" to "no". You may need changing it to "yes" if senders cannot use complete domain names in e-mail addresses.\n\nThe "relay_domains" default value has changed from "$mydestination" to the empty value. This could result in unexpected "Relay access denied" errors or ETRN errors, because now will postfix by default relay only for the localhost.\n\nThe "mynetworks_style" default value has changed from "subnet" to "host". This parameter is used to implement the "permit_mynetworks" feature. The change could result in unexpected "access denied" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.\n\nPostfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.\n', 'audience': 'sysadmin', 'key': '5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33', 'id': '7eff2ca77b4e483f8ee1ea32c887e6c8bbc9145171246e7b76330fa6da34c276', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_postfix", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "postfix"}]}, "groups": ["services", "email"], "hostname": "managed-node01", "id": "7eff2ca77b4e483f8ee1ea32c887e6c8bbc9145171246e7b76330fa6da34c276", "key": "5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33", "severity": "low", "summary": "Postfix 3.x has so called \"compatibility safety net\" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.\nThe backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.\nIt can be turned on by running: \"postconf -e compatibility_level=0\nIt can be turned off by running: \"postconf -e compatibility_level=2\n\nIn the Postfix MySQL database client, the default \"option_group\" value has changed to \"client\", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set \"option_group\" to the empty string.\n\nThe postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.\n\nPostfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to \"auto\", and introduces a new parameter \"tls_eecdh_auto_curves\" with the names of curves that may be negotiated.\n\nThe \"master.cf\" chroot default value has changed from \"y\" (yes) to \"n\" (no). This applies to master.cf services where chroot field is not explicitly specified.\n\nThe \"append_dot_mydomain\" default value has changed from \"yes\" to \"no\". You may need changing it to \"yes\" if senders cannot use complete domain names in e-mail addresses.\n\nThe \"relay_domains\" default value has changed from \"$mydestination\" to the empty value. This could result in unexpected \"Relay access denied\" errors or ETRN errors, because now will postfix by default relay only for the localhost.\n\nThe \"mynetworks_style\" default value has changed from \"subnet\" to \"host\". This parameter is used to implement the \"permit_mynetworks\" feature. The change could result in unexpected \"access denied\" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.\n\nPostfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.\n", "timeStamp": "2026-02-17T12:34:39.966466Z", "title": "Postfix has incompatible changes in the next major version"}, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : parse_leapp_report | Collect inhibitors] ************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:51 ok: [managed-node01] => {"changed": false, "cmd": ["awk", "/\\(inhibitor\\)/,/^-------/", "/var/log/leapp/leapp-report.txt"], "delta": "0:00:00.003326", "end": "2026-02-17 07:35:04.796608", "failed_when_result": false, "msg": "", "rc": 0, "start": "2026-02-17 07:35:04.793282", "stderr": "", "stderr_lines": [], "stdout": "Risk Factor: high (inhibitor)\nTitle: Use of CIFS detected. Upgrade can't proceed\nSummary: CIFS is currently not supported by the inplace upgrade.\nRelated links:\n - Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\": https://access.redhat.com/solutions/6964304\nRemediation: [hint] Comment out CIFS entries to proceed with the upgrade.\nKey: d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a\n----------------------------------------\nRisk Factor: high (inhibitor)\nTitle: Use of NFS detected. Upgrade can't proceed\nSummary: NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n\nRelated links:\n - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006\nRemediation: [hint] Disable NFS temporarily for the upgrade if possible.\nKey: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed\n----------------------------------------\nRisk Factor: high (inhibitor)\nTitle: Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\nSummary: Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n - tulip\n\nRelated links:\n - Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" : https://access.redhat.com/solutions/6971716\n - Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\": https://access.redhat.com/solutions/5436131\nKey: f08a07da902958defa4f5c2699fae9ec2eb67c5b\n----------------------------------------", "stdout_lines": ["Risk Factor: high (inhibitor)", "Title: Use of CIFS detected. Upgrade can't proceed", "Summary: CIFS is currently not supported by the inplace upgrade.", "Related links:", " - Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\": https://access.redhat.com/solutions/6964304", "Remediation: [hint] Comment out CIFS entries to proceed with the upgrade.", "Key: d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Use of NFS detected. Upgrade can't proceed", "Summary: NFS is currently not supported by the inplace upgrade.", "We have found NFS usage at the following locations:", "- NFS shares found in /etc/fstab:", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat", " - nest.test.redhat.com:/mnt/qa /mnt/qa", " - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive", " - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch", "", "Related links:", " - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006", "Remediation: [hint] Disable NFS temporarily for the upgrade if possible.", "Key: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", "Summary: Support for the following RHEL 7 device drivers has been removed in RHEL 8:", " - pata_acpi", " - tulip", "", "Related links:", " - Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" : https://access.redhat.com/solutions/6971716", " - Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\": https://access.redhat.com/solutions/5436131", "Key: f08a07da902958defa4f5c2699fae9ec2eb67c5b", "----------------------------------------"]} TASK [infra.leapp.common : parse_leapp_report | Collect high errors] *********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:60 ok: [managed-node01] => {"changed": false, "cmd": ["awk", "/high \\(error\\)/,/^-------/", "/var/log/leapp/leapp-report.txt"], "delta": "0:00:00.003109", "end": "2026-02-17 07:35:05.069626", "failed_when_result": false, "msg": "", "rc": 0, "start": "2026-02-17 07:35:05.066517", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} TASK [infra.leapp.analysis : analysis-leapp | Copy reports to the controller] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:115 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/copy_reports_to_controller.yml for managed-node01 TASK [infra.leapp.analysis : copy_reports_to_controller | Ensure reports directory on controller] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/copy_reports_to_controller.yml:10 changed: [managed-node01 -> localhost] => {"changed": true, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/leapp_reports_2026-02-17_12-35-05", "secontext": "unconfined_u:object_r:admin_home_t:s0", "size": 6, "state": "directory", "uid": 0} TASK [infra.leapp.analysis : copy_reports_to_controller | Copy report files to the controller] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/copy_reports_to_controller.yml:18 changed: [managed-node01] => (item={'src': '/var/log/leapp/leapp-report.json', 'ext': 'json'}) => {"ansible_loop_var": "item", "changed": true, "checksum": "905ae6f453b71ef6440b1d2410f9018dda2a8c7c", "dest": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/leapp_reports_2026-02-17_12-35-05/leapp-report.managed-node01.json/managed-node01/var/log/leapp/leapp-report.json", "item": {"ext": "json", "src": "/var/log/leapp/leapp-report.json"}, "md5sum": "492f0c30f9196518801f97050e37daf2", "remote_checksum": "905ae6f453b71ef6440b1d2410f9018dda2a8c7c", "remote_md5sum": null} changed: [managed-node01] => (item={'src': '/var/log/leapp/leapp-report.txt', 'ext': 'txt'}) => {"ansible_loop_var": "item", "changed": true, "checksum": "78f8360dbf9927ad8b6af90ebf8049bccb42ccb9", "dest": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/leapp_reports_2026-02-17_12-35-05/leapp-report.managed-node01.txt/managed-node01/var/log/leapp/leapp-report.txt", "item": {"ext": "txt", "src": "/var/log/leapp/leapp-report.txt"}, "md5sum": "65c18305fe9db5cce3927fe9c5e8d2c4", "remote_checksum": "78f8360dbf9927ad8b6af90ebf8049bccb42ccb9", "remote_md5sum": null} TASK [infra.leapp.analysis : analysis-leapp | Create remediation hostvars] ***** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:119 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/create_remediation_hostvars.yml for managed-node01 TASK [infra.leapp.analysis : create_remediation_hostvars | Clear remediation_todo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/create_remediation_hostvars.yml:2 ok: [managed-node01] => {"ansible_facts": {"leapp_remediation_todo": []}, "changed": false} TASK [infra.leapp.analysis : create_remediation_hostvars | Map inhibitors to remediation_todo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/create_remediation_hostvars.yml:6 ok: [managed-node01] => (item="d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a" [found], "Use of CIFS detected. Upgrade can't proceed" [found] -> leapp_cifs_detected) => {"ansible_facts": {"leapp_remediation_todo": ["leapp_cifs_detected"]}, "ansible_loop_var": "inhibitor", "changed": false, "inhibitor": {"actor": "check_cifs", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "f50613dba17a3a40b51dc97c95d254a3ecd0b55eda7bdf3b2af0c9a1eeb1eb0c", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2026-02-17T12:34:35.757145Z", "title": "Use of CIFS detected. Upgrade can't proceed"}} ok: [managed-node01] => (item="9881b25faceeeaa7a6478bcdac29afd7f6baaaed" [found], "Use of NFS detected. Upgrade can't proceed" [found] -> leapp_nfs_detected) => {"ansible_facts": {"leapp_remediation_todo": ["leapp_cifs_detected", "leapp_nfs_detected"]}, "ansible_loop_var": "inhibitor", "changed": false, "inhibitor": {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "04749fbd44a55cd8c638dc8ece4e339fb5c0f11ef73af006a53e34491377c1a6", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2026-02-17T12:34:36.642637Z", "title": "Use of NFS detected. Upgrade can't proceed"}} ok: [managed-node01] => (item="f08a07da902958defa4f5c2699fae9ec2eb67c5b" [found], "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed." [found] -> leapp_loaded_removed_kernel_drivers) => {"ansible_facts": {"leapp_remediation_todo": ["leapp_cifs_detected", "leapp_nfs_detected", "leapp_loaded_removed_kernel_drivers"]}, "ansible_loop_var": "inhibitor", "changed": false, "inhibitor": {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "c315e4f0f3557c1aa48f0a0b53a7e34f2124a802d0be0908cc3f0a5022403f71", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n - tulip\n", "timeStamp": "2026-02-17T12:34:38.364045Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}} TASK [infra.leapp.analysis : create_remediation_hostvars | Ensure host_vars directory exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/create_remediation_hostvars.yml:29 changed: [managed-node01 -> localhost] => {"changed": true, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/host_vars", "secontext": "unconfined_u:object_r:admin_home_t:s0", "size": 6, "state": "directory", "uid": 0} TASK [infra.leapp.analysis : create_remediation_hostvars | Check if host_vars file exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/create_remediation_hostvars.yml:37 ok: [managed-node01 -> localhost] => {"changed": false, "stat": {"exists": false}} TASK [infra.leapp.analysis : create_remediation_hostvars | Read existing host_vars file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/create_remediation_hostvars.yml:43 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : create_remediation_hostvars | Write host_vars file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/create_remediation_hostvars.yml:50 changed: [managed-node01 -> localhost] => {"changed": true, "checksum": "11f7bda6201b1cdb4913b2db7b45c0843cb21b7c", "dest": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/host_vars/managed-node01.yml", "gid": 0, "group": "root", "md5sum": "016019d11862f2a9a576016b47847912", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:admin_home_t:s0", "size": 109, "src": "/root/.ansible/tmp/ansible-tmp-1771331706.7084827-10706-107197110162926/source", "state": "file", "uid": 0} TASK [infra.leapp.analysis : create_remediation_hostvars | Create remediation playbook file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/create_remediation_hostvars.yml:67 changed: [managed-node01 -> localhost] => {"changed": true, "checksum": "078e4b5f81d092599c4c3765af8eae9ad8c501b3", "dest": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/remediate.yml", "gid": 0, "group": "root", "md5sum": "d099bababf24590e9e539eadf7bfcf96", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:admin_home_t:s0", "size": 178, "src": "/root/.ansible/tmp/ansible-tmp-1771331707.1019127-10728-57908395113491/source", "state": "file", "uid": 0} TASK [infra.leapp.analysis : create_remediation_hostvars | Remove remediation host_vars if no inhibitors] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/create_remediation_hostvars.yml:83 skipping: [managed-node01] => (item=/root/.ansible/collections/ansible_collections/infra/leapp/tests/host_vars/managed-node01.yml) => {"ansible_loop_var": "item", "changed": false, "item": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/host_vars/managed-node01.yml", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item=/root/.ansible/collections/ansible_collections/infra/leapp/tests/remediate.yml) => {"ansible_loop_var": "item", "changed": false, "item": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/remediate.yml", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => {"changed": false, "msg": "All items skipped"} TASK [infra.leapp.analysis : Set stats for leapp_inhibitors] ******************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:17 ok: [managed-node01] => {"ansible_stats": {"aggregate": true, "data": {"leapp_inhibitors": [{"actor": "check_cifs", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "f50613dba17a3a40b51dc97c95d254a3ecd0b55eda7bdf3b2af0c9a1eeb1eb0c", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2026-02-17T12:34:35.757145Z", "title": "Use of CIFS detected. Upgrade can't proceed"}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "04749fbd44a55cd8c638dc8ece4e339fb5c0f11ef73af006a53e34491377c1a6", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2026-02-17T12:34:36.642637Z", "title": "Use of NFS detected. Upgrade can't proceed"}, {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "c315e4f0f3557c1aa48f0a0b53a7e34f2124a802d0be0908cc3f0a5022403f71", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n - tulip\n", "timeStamp": "2026-02-17T12:34:38.364045Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}]}, "per_host": false}, "changed": false} TASK [infra.leapp.analysis : Notify analysis report is done handler] *********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:22 NOTIFIED HANDLER infra.leapp.analysis : Preupgrade analysis report is done for managed-node01 NOTIFIED HANDLER infra.leapp.analysis : Display inhibitors for managed-node01 NOTIFIED HANDLER infra.leapp.analysis : Display errors for managed-node01 changed: [managed-node01] => {"changed": true, "msg": "All assertions passed"} TASK [common_upgrade_tasks | Flush handlers] *********************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:44 META: triggered running handlers for managed-node01 RUNNING HANDLER [infra.leapp.common : Check for log file] ********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:3 ok: [managed-node01] => {"changed": false, "stat": {"atime": 1771331627.2225292, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 40, "charset": "us-ascii", "checksum": "b9ba42e668efa30382e6242d6aaacce2aa7582be", "ctime": 1771331680.5438404, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 457179206, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1771331680.5438404, "nlink": 1, "path": "/var/log/ripu/ripu.log", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 18197, "uid": 0, "version": "714347015", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} RUNNING HANDLER [infra.leapp.common : Add end time to log file] **************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:9 changed: [managed-node01] => {"backup": "", "changed": true, "msg": "line added"} RUNNING HANDLER [infra.leapp.common : Slurp ripu.log file] ********************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:19 ok: [managed-node01] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} RUNNING HANDLER [infra.leapp.common : Decode ripu.log file] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:27 ok: [managed-node01] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} RUNNING HANDLER [infra.leapp.common : Rename log file] ************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:34 changed: [managed-node01] => {"changed": true, "cmd": "export PATH=$PATH\nmv /var/log/ripu/ripu.log /var/log/ripu/ripu.log-20260217T073339\n", "delta": "0:00:00.003858", "end": "2026-02-17 07:35:08.698029", "msg": "", "rc": 0, "start": "2026-02-17 07:35:08.694171", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} RUNNING HANDLER [infra.leapp.common : Check for log file] ********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:3 ok: [managed-node01] => {"changed": false, "stat": {"exists": false}} RUNNING HANDLER [infra.leapp.common : Add end time to log file] **************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:9 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Slurp ripu.log file] ********************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:19 skipping: [managed-node01] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} RUNNING HANDLER [infra.leapp.common : Decode ripu.log file] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:27 skipping: [managed-node01] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} RUNNING HANDLER [infra.leapp.common : Rename log file] ************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:34 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.analysis : Display inhibitors] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/handlers/main.yml:10 ok: [managed-node01] => { "results_inhibitors.stdout_lines": [ "Risk Factor: high (inhibitor)", "Title: Use of CIFS detected. Upgrade can't proceed", "Summary: CIFS is currently not supported by the inplace upgrade.", "Related links:", " - Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\": https://access.redhat.com/solutions/6964304", "Remediation: [hint] Comment out CIFS entries to proceed with the upgrade.", "Key: d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Use of NFS detected. Upgrade can't proceed", "Summary: NFS is currently not supported by the inplace upgrade.", "We have found NFS usage at the following locations:", "- NFS shares found in /etc/fstab:", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat", " - nest.test.redhat.com:/mnt/qa /mnt/qa", " - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive", " - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch", "", "Related links:", " - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006", "Remediation: [hint] Disable NFS temporarily for the upgrade if possible.", "Key: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", "Summary: Support for the following RHEL 7 device drivers has been removed in RHEL 8:", " - pata_acpi", " - tulip", "", "Related links:", " - Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" : https://access.redhat.com/solutions/6971716", " - Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\": https://access.redhat.com/solutions/5436131", "Key: f08a07da902958defa4f5c2699fae9ec2eb67c5b", "----------------------------------------" ] } RUNNING HANDLER [infra.leapp.analysis : Display errors] ************************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/handlers/main.yml:18 skipping: [managed-node01] => {} RUNNING HANDLER [infra.leapp.analysis : Preupgrade analysis report is done] **** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/handlers/main.yml:26 ok: [managed-node01] => { "msg": "The preupgrade analysis report generation is now complete. WARNING: Inhibitors found. Review the tasks above or the result file at /var/log/leapp/leapp-report.txt." } TASK [common_upgrade_tasks | Show all inhibitors collected by analysis] ******** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:47 ok: [managed-node01] => { "leapp_inhibitors | default([])": [ { "actor": "check_cifs", "audience": "sysadmin", "detail": { "external": [ { "title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304" } ], "related_resources": [ { "scheme": "file", "title": "/etc/fstab" } ], "remediations": [ { "context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint" } ] }, "groups": [ "filesystem", "network", "inhibitor" ], "hostname": "managed-node01", "id": "f50613dba17a3a40b51dc97c95d254a3ecd0b55eda7bdf3b2af0c9a1eeb1eb0c", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2026-02-17T12:34:35.757145Z", "title": "Use of CIFS detected. Upgrade can't proceed" }, { "actor": "check_nfs", "audience": "sysadmin", "detail": { "external": [ { "title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006" } ], "related_resources": [ { "scheme": "file", "title": "/etc/fstab" } ], "remediations": [ { "context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint" } ] }, "groups": [ "filesystem", "network", "inhibitor" ], "hostname": "managed-node01", "id": "04749fbd44a55cd8c638dc8ece4e339fb5c0f11ef73af006a53e34491377c1a6", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2026-02-17T12:34:36.642637Z", "title": "Use of NFS detected. Upgrade can't proceed" }, { "actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": { "external": [ { "title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716" }, { "title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131" } ] }, "groups": [ "kernel", "drivers", "inhibitor" ], "hostname": "managed-node01", "id": "c315e4f0f3557c1aa48f0a0b53a7e34f2124a802d0be0908cc3f0a5022403f71", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n - tulip\n", "timeStamp": "2026-02-17T12:34:38.364045Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed." } ] } TASK [common_upgrade_tasks | Debug remediation_todo] *************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:51 ok: [managed-node01] => { "leapp_remediation_todo": [ "leapp_cifs_detected", "leapp_nfs_detected", "leapp_loaded_removed_kernel_drivers" ] } TASK [common_upgrade_tasks | Assert remediate hostvars and playbook exist] ***** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:58 failed: [managed-node01 -> localhost] (item=/root/.ansible/collections/ansible_collections/infra/leapp/tests/host_vars/managed-node01.yml) => {"ansible_loop_var": "item", "changed": false, "failed_when_result": true, "item": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/host_vars/managed-node01.yml", "stat": {"atime": 1771331707.0395849, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "11f7bda6201b1cdb4913b2db7b45c0843cb21b7c", "ctime": 1771331707.042585, "dev": 51716, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 754974887, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1771331706.8785832, "nlink": 1, "path": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/host_vars/managed-node01.yml", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 109, "uid": 0, "version": "3712436908", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} failed: [managed-node01 -> localhost] (item=/root/.ansible/collections/ansible_collections/infra/leapp/tests/remediate.yml) => {"ansible_loop_var": "item", "changed": false, "failed_when_result": true, "item": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/remediate.yml", "stat": {"atime": 1771331707.437589, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "078e4b5f81d092599c4c3765af8eae9ad8c501b3", "ctime": 1771331707.440589, "dev": 51716, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 780140710, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1771331707.2785873, "nlink": 1, "path": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/remediate.yml", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 178, "uid": 0, "version": "1069369910", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} TASK [tests_upgrade_custom | Cleanup | Remove log files] *********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/tests_upgrade_custom.yml:49 changed: [managed-node01] => {"changed": true, "cmd": "set -euxo pipefail\nrm -f /var/log/leapp/leapp-upgrade.log\nrm -f /var/log/ripu/ripu.log*\n", "delta": "0:00:00.004296", "end": "2026-02-17 07:35:10.476878", "msg": "", "rc": 0, "start": "2026-02-17 07:35:10.472582", "stderr": "+ rm -f /var/log/leapp/leapp-upgrade.log\n+ rm -f /var/log/ripu/ripu.log-20260217T073339", "stderr_lines": ["+ rm -f /var/log/leapp/leapp-upgrade.log", "+ rm -f /var/log/ripu/ripu.log-20260217T073339"], "stdout": "", "stdout_lines": []} PLAY RECAP ********************************************************************* managed-node01 : ok=68 changed=19 unreachable=0 failed=1 skipped=32 rescued=0 ignored=0 -- Logs begin at Tue 2026-02-17 07:30:40 EST, end at Tue 2026-02-17 07:35:11 EST. -- Feb 17 07:33:39 managed-node01 ansible-ansible.legacy.setup[12529]: Invoked with filter=[] gather_subset=['all'] fact_path=/etc/ansible/facts.d gather_timeout=10 Feb 17 07:33:39 managed-node01 ansible-ansible.builtin.stat[12620]: Invoked with checksum_algorithm=sha1 get_checksum=True follow=False path=/var/log/leapp/leapp-upgrade.log get_md5=False get_mime=True get_attributes=True Feb 17 07:33:40 managed-node01 ansible-ansible.legacy.yum[12681]: Invoked with lock_timeout=30 update_cache=False conf_file=None exclude=[] allow_downgrade=False sslverify=True disable_gpg_check=False disable_excludes=None use_backend=auto validate_certs=True state=absent disablerepo=[] skip_broken=False releasever=None cacheonly=False autoremove=False download_dir=None installroot=/ install_weak_deps=True name=['leapp-upgrade'] download_only=False bugfix=False list=None install_repoquery=True update_only=False disable_plugin=[] enablerepo=[] security=False enable_plugin=[] Feb 17 07:33:42 managed-node01 yum[12693]: Erased: leapp-upgrade-el7toel8-0.20.0-9.el7_9.noarch Feb 17 07:33:42 managed-node01 yum[12693]: Erased: leapp-0.17.0-2.el7_9.noarch Feb 17 07:33:43 managed-node01 ansible-ansible.builtin.lineinfile[12767]: Invoked with group=None insertbefore=None unsafe_writes=False selevel=None create=False seuser=None serole=None owner=None backrefs=False search_string=None state=present firstmatch=False mode=None path=/etc/fstab insertafter=None regexp=None line=//127.0.0.1/test_remediate_cifs /mnt/cifs cifs username=test,password=test 0 0 attributes=None backup=False validate=None setype=None Feb 17 07:33:44 managed-node01 ansible-infra.leapp.modprobe[12828]: Invoked with state=present params= name=3w-9xxx persistent=disabled Feb 17 07:33:44 managed-node01 kernel: 3ware 9000 Storage Controller device driver for Linux v2.26.02.014.rh1. Feb 17 07:33:44 managed-node01 ansible-infra.leapp.modprobe[12895]: Invoked with state=present params= name=pata_acpi persistent=disabled Feb 17 07:33:45 managed-node01 ansible-infra.leapp.modprobe[12958]: Invoked with state=present params= name=tulip persistent=disabled Feb 17 07:33:45 managed-node01 kernel: tulip: Linux Tulip driver version 1.1.15 (Feb 27, 2007) Feb 17 07:33:45 managed-node01 ansible-ansible.builtin.file[13023]: Invoked with src=None selevel=None force=False setype=None _original_basename=None unsafe_writes=False access_time=None seuser=None recurse=False state=directory access_time_format=%Y%m%d%H%M.%S group=root modification_time=None serole=None _diff_peek=None modification_time_format=%Y%m%d%H%M.%S path=/var/log/ripu owner=root follow=True attributes=None mode=0755 Feb 17 07:33:46 managed-node01 ansible-ansible.builtin.stat[13084]: Invoked with checksum_algorithm=sha1 get_checksum=True follow=False path=/var/log/ripu/ripu.log get_md5=False get_mime=True get_attributes=True Feb 17 07:33:46 managed-node01 ansible-ansible.legacy.stat[13145]: Invoked with checksum_algorithm=sha1 get_checksum=True path=/var/log/ripu/ripu.log follow=False get_md5=False get_mime=True get_attributes=True Feb 17 07:33:47 managed-node01 ansible-ansible.legacy.copy[13192]: Invoked with src=/root/.ansible/tmp/ansible-tmp-1771331626.3979518-9420-118383829298130/source directory_mode=None force=True attributes=None remote_src=None unsafe_writes=False dest=/var/log/ripu/ripu.log seuser=None setype=None group=root content=NOT_LOGGING_PARAMETER _original_basename=tmpbvl5fjyd serole=None mode=0644 selevel=None owner=root follow=False validate=None checksum=98e93e8ec8861fe292fdf3dda8a8125881e17d95 backup=False local_follow=None Feb 17 07:33:47 managed-node01 ansible-ansible.builtin.file[13253]: Invoked with src=None selevel=None force=False setype=None _original_basename=None unsafe_writes=False access_time=None seuser=None recurse=False state=directory access_time_format=%Y%m%d%H%M.%S group=root modification_time=None serole=None _diff_peek=None modification_time_format=%Y%m%d%H%M.%S path=/etc/ansible/facts.d owner=root follow=True attributes=None mode=0755 Feb 17 07:33:47 managed-node01 ansible-ansible.legacy.stat[13314]: Invoked with checksum_algorithm=sha1 get_checksum=True path=/etc/ansible/facts.d/pre_ripu.fact follow=False get_md5=False get_mime=True get_attributes=True Feb 17 07:33:48 managed-node01 ansible-ansible.legacy.copy[13363]: Invoked with src=/root/.ansible/tmp/ansible-tmp-1771331627.7675266-9527-248133583776131/source directory_mode=None force=True attributes=None remote_src=None unsafe_writes=False dest=/etc/ansible/facts.d/pre_ripu.fact seuser=None setype=None group=root content=NOT_LOGGING_PARAMETER _original_basename=tmpx63js4bs serole=None mode=0644 selevel=None owner=root follow=False validate=None checksum=58544acb56c7eddcd18e3a5828810de5a296c2ae backup=False local_follow=None Feb 17 07:33:48 managed-node01 ansible-ansible.legacy.command[13424]: Invoked with executable=None _uses_shell=True strip_empty_ends=True _raw_params=set -o pipefail; export PATH=$PATH; rpm -qa | grep -ve '[\.|+]el7' | grep -vE '^(gpg-pubkey|libmodulemd|katello-ca-consumer)' | sort removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Feb 17 07:33:49 managed-node01 ansible-ansible.legacy.stat[13491]: Invoked with checksum_algorithm=sha1 get_checksum=True path=/etc/ansible/facts.d/non_rhel_packages.fact follow=False get_md5=False get_mime=True get_attributes=True Feb 17 07:33:49 managed-node01 ansible-ansible.legacy.file[13523]: Invoked with force=False _original_basename=tmprzn3g006 owner=root follow=True group=root unsafe_writes=False serole=None state=file selevel=None setype=None dest=/etc/ansible/facts.d/non_rhel_packages.fact access_time=None access_time_format=%Y%m%d%H%M.%S modification_time=None path=/etc/ansible/facts.d/non_rhel_packages.fact src=None seuser=None recurse=False _diff_peek=None mode=0644 modification_time_format=%Y%m%d%H%M.%S attributes=None Feb 17 07:33:50 managed-node01 ansible-ansible.legacy.yum[13584]: Invoked with lock_timeout=30 update_cache=False conf_file=None exclude=[] allow_downgrade=False sslverify=True disable_gpg_check=False disable_excludes=None use_backend=auto validate_certs=True state=latest disablerepo=[] releasever=None skip_broken=False cacheonly=False autoremove=False download_dir=None installroot=/ install_weak_deps=True name=['leapp-upgrade'] download_only=False bugfix=False list=None install_repoquery=True update_only=False disable_plugin=[] enablerepo=['rhel-7-server-extras-rpms'] security=False enable_plugin=[] Feb 17 07:33:54 managed-node01 yum[13609]: Installed: leapp-upgrade-el7toel8-0.20.0-9.el7_9.noarch Feb 17 07:33:54 managed-node01 yum[13609]: Installed: leapp-0.17.0-2.el7_9.noarch Feb 17 07:33:54 managed-node01 ansible-ansible.builtin.file[13686]: Invoked with src=None selevel=None force=False setype=None _original_basename=None unsafe_writes=False access_time=None seuser=None recurse=False state=directory access_time_format=%Y%m%d%H%M.%S group=root modification_time=None serole=None _diff_peek=None modification_time_format=%Y%m%d%H%M.%S path=/var/log/leapp owner=root follow=True attributes=None mode=0700 Feb 17 07:33:55 managed-node01 ansible-ansible.legacy.stat[13747]: Invoked with checksum_algorithm=sha1 get_checksum=True path=/var/log/leapp/answerfile follow=False get_md5=False get_mime=True get_attributes=True Feb 17 07:33:55 managed-node01 ansible-ansible.legacy.copy[13795]: Invoked with src=/root/.ansible/tmp/ansible-tmp-1771331634.8647442-9748-61320255236294/source directory_mode=None force=True attributes=None remote_src=None unsafe_writes=False dest=/var/log/leapp/answerfile seuser=None setype=None group=root content=NOT_LOGGING_PARAMETER _original_basename=tmpi6b_qiwk serole=None mode=0644 selevel=None owner=root follow=False validate=None checksum=3d934ad808576e3a7fb4c14a89645a4ad55ccf53 backup=False local_follow=None Feb 17 07:33:55 managed-node01 ansible-ansible.builtin.file[13857]: Invoked with src=None selevel=None force=False setype=None _original_basename=None unsafe_writes=False access_time=None seuser=None recurse=False state=absent access_time_format=%Y%m%d%H%M.%S group=None modification_time=None serole=None _diff_peek=None modification_time_format=%Y%m%d%H%M.%S path=/etc/leapp/files/leapp_upgrade_repositories.repo owner=None follow=True attributes=None mode=None Feb 17 07:33:56 managed-node01 ansible-ansible.builtin.yum_repository[13918]: Invoked with metalink=None ip_resolve=None enabled=True proxy_password=NOT_LOGGING_PARAMETER mode=0644 mirrorlist_expire=None bandwidth=None cost=None file=/etc/leapp/files/leapp_upgrade_repositories owner=root exclude=None keepalive=None repo_gpgcheck=None group=root failovermethod=None unsafe_writes=False deltarpm_metadata_percentage=None gpgkey=None setype=None http_caching=None priority=None state=present mirrorlist=None params=None gpgcheck=False include=None sslcacert=None username=None metadata_expire=None description=BaseOS for x86_64 retries=None selevel=None sslclientcert=None gpgcakey=None baseurl=['http://download.devel.redhat.com/rhel-8/nightly/updates/RHEL-8/latest-RHEL-8.10/compose/BaseOS/x86_64/os/'] s3_enabled=None ssl_check_cert_permissions=None includepkgs=None async=None sslverify=None password=NOT_LOGGING_PARAMETER ui_repoid_vars=None protect=None serole=None throttle=None name=rhel-8-for-x86_64-baseos-rpms deltarpm_percentage=None sslclientkey=None seuser=None reposdir=/etc/yum.repos.d skip_if_unavailable=None module_hotfixes=None keepcache=None proxy_username=None timeout=None attributes=None metadata_expire_filter=None enablegroups=None proxy=None Feb 17 07:33:56 managed-node01 ansible-ansible.builtin.yum_repository[13979]: Invoked with metalink=None ip_resolve=None enabled=True proxy_password=NOT_LOGGING_PARAMETER mode=0644 mirrorlist_expire=None bandwidth=None cost=None file=/etc/leapp/files/leapp_upgrade_repositories owner=root exclude=None keepalive=None repo_gpgcheck=None group=root failovermethod=None unsafe_writes=False deltarpm_metadata_percentage=None gpgkey=None setype=None http_caching=None priority=None state=present mirrorlist=None params=None gpgcheck=False include=None sslcacert=None username=None metadata_expire=None description=AppStream for x86_64 retries=None selevel=None sslclientcert=None gpgcakey=None baseurl=['http://download.devel.redhat.com/rhel-8/nightly/updates/RHEL-8/latest-RHEL-8.10/compose/AppStream/x86_64/os/'] s3_enabled=None ssl_check_cert_permissions=None includepkgs=None async=None sslverify=None password=NOT_LOGGING_PARAMETER ui_repoid_vars=None protect=None serole=None throttle=None name=rhel-8-for-x86_64-appstream-rpms deltarpm_percentage=None sslclientkey=None seuser=None reposdir=/etc/yum.repos.d skip_if_unavailable=None module_hotfixes=None keepcache=None proxy_username=None timeout=None attributes=None metadata_expire_filter=None enablegroups=None proxy=None Feb 17 07:34:02 managed-node01 ansible-async_wrapper.py[14052]: Invoked with j538480478614 7200 /root/.ansible/tmp/ansible-tmp-1771331636.711396-9970-124001217467098/AnsiballZ_command.py _ Feb 17 07:34:02 managed-node01 ansible-async_wrapper.py[14055]: Starting module and watcher Feb 17 07:34:02 managed-node01 ansible-async_wrapper.py[14055]: Start watching 14056 (7200) Feb 17 07:34:02 managed-node01 ansible-async_wrapper.py[14056]: Start module (14056) Feb 17 07:34:02 managed-node01 ansible-async_wrapper.py[14052]: Return async_wrapper task started. Feb 17 07:34:02 managed-node01 ansible-ansible.legacy.command[14057]: Invoked with executable=/bin/bash _uses_shell=True strip_empty_ends=True _raw_params=set -o pipefail; export PATH=$PATH; ulimit -n 16384; leapp preupgrade --report-schema=1.2.0 --no-rhsm 2>&1 | tee -a /var/log/ripu/ripu.log removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Feb 17 07:34:07 managed-node01 ansible-async_wrapper.py[14055]: 14056 still running (7200) Feb 17 07:34:12 managed-node01 ansible-async_wrapper.py[14055]: 14056 still running (7195) Feb 17 07:34:17 managed-node01 ansible-async_wrapper.py[14055]: 14056 still running (7190) Feb 17 07:34:22 managed-node01 ansible-async_wrapper.py[14055]: 14056 still running (7185) Feb 17 07:34:27 managed-node01 ansible-async_wrapper.py[14055]: 14056 still running (7180) Feb 17 07:34:32 managed-node01 ansible-async_wrapper.py[14055]: 14056 still running (7175) Feb 17 07:34:37 managed-node01 ansible-async_wrapper.py[14055]: 14056 still running (7170) Feb 17 07:34:40 managed-node01 ansible-async_wrapper.py[14056]: Module complete (14056) Feb 17 07:34:42 managed-node01 ansible-async_wrapper.py[14055]: Done in kid B. Feb 17 07:35:01 managed-node01 sshd[11962]: Received disconnect from 10.31.8.42 port 48834:11: disconnected by user Feb 17 07:35:01 managed-node01 sshd[11962]: Disconnected from 10.31.8.42 port 48834 Feb 17 07:35:01 managed-node01 sshd[11962]: pam_unix(sshd:session): session closed for user root Feb 17 07:35:01 managed-node01 systemd-logind[564]: Removed session 2. -- Subject: Session 2 has been terminated -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- Documentation: http://www.freedesktop.org/wiki/Software/systemd/multiseat -- -- A session with the ID 2 has been terminated. Feb 17 07:35:01 managed-node01 systemd[1]: Removed slice User Slice of root. -- Subject: Unit user-0.slice has finished shutting down -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- -- Unit user-0.slice has finished shutting down. Feb 17 07:35:02 managed-node01 sshd[22200]: Accepted publickey for root from 10.31.8.42 port 42502 ssh2: ECDSA SHA256:D3axHAvFbwi9dHfRTrLRFOkIDtPvUdC3d0Gx6RR6uB0 Feb 17 07:35:02 managed-node01 systemd[1]: Created slice User Slice of root. -- Subject: Unit user-0.slice has finished start-up -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- -- Unit user-0.slice has finished starting up. -- -- The start-up result is done. Feb 17 07:35:02 managed-node01 systemd-logind[564]: New session 4 of user root. -- Subject: A new session 4 has been created for user root -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- Documentation: http://www.freedesktop.org/wiki/Software/systemd/multiseat -- -- A new session with the ID 4 has been created for the user root. -- -- The leading process of the session is 22200. Feb 17 07:35:02 managed-node01 systemd[1]: Started Session 4 of user root. -- Subject: Unit session-4.scope has finished start-up -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- -- Unit session-4.scope has finished starting up. -- -- The start-up result is done. Feb 17 07:35:02 managed-node01 sshd[22200]: pam_unix(sshd:session): session opened for user root by (uid=0) Feb 17 07:35:02 managed-node01 ansible-ansible.legacy.async_status[22261]: Invoked with jid=j538480478614.14052 mode=status _async_dir=/root/.ansible_async Feb 17 07:35:02 managed-node01 ansible-ansible.legacy.async_status[22300]: Invoked with jid=j538480478614.14052 mode=cleanup _async_dir=/root/.ansible_async Feb 17 07:35:03 managed-node01 ansible-ansible.builtin.stat[22361]: Invoked with checksum_algorithm=sha1 get_checksum=True follow=False path=/var/log/leapp/leapp-report.txt get_md5=False get_mime=True get_attributes=True Feb 17 07:35:04 managed-node01 ansible-ansible.legacy.command[22547]: Invoked with executable=None _uses_shell=False strip_empty_ends=True _raw_params=awk '/\(inhibitor\)/,/^-------/' /var/log/leapp/leapp-report.txt removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Feb 17 07:35:05 managed-node01 ansible-ansible.legacy.command[22609]: Invoked with executable=None _uses_shell=False strip_empty_ends=True _raw_params=awk '/high \(error\)/,/^-------/' /var/log/leapp/leapp-report.txt removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Feb 17 07:35:05 managed-node01 ansible-ansible.legacy.stat[22672]: Invoked with checksum_algorithm=sha1 get_checksum=True path=/var/log/leapp/leapp-report.json follow=True get_md5=False get_mime=True get_attributes=True Feb 17 07:35:05 managed-node01 ansible-ansible.legacy.stat[22742]: Invoked with checksum_algorithm=sha1 get_checksum=True path=/var/log/leapp/leapp-report.txt follow=True get_md5=False get_mime=True get_attributes=True Feb 17 07:35:07 managed-node01 ansible-ansible.builtin.stat[22813]: Invoked with checksum_algorithm=sha1 get_checksum=True follow=False path=/var/log/ripu/ripu.log get_md5=False get_mime=True get_attributes=True Feb 17 07:35:08 managed-node01 ansible-ansible.builtin.lineinfile[22877]: Invoked with group=root insertbefore=None unsafe_writes=False selevel=None create=False seuser=None serole=None backrefs=False search_string=None state=present firstmatch=False mode=0644 insertafter=None path=/var/log/ripu/ripu.log owner=root regexp=None line=Job ended at 2026-02-17T12:35:07Z attributes=None backup=False validate=None setype=None Feb 17 07:35:08 managed-node01 ansible-ansible.legacy.command[22999]: Invoked with executable=None _uses_shell=True strip_empty_ends=True _raw_params=export PATH=$PATH mv /var/log/ripu/ripu.log /var/log/ripu/ripu.log-20260217T073339 removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Feb 17 07:35:08 managed-node01 ansible-ansible.builtin.stat[23061]: Invoked with checksum_algorithm=sha1 get_checksum=True follow=False path=/var/log/ripu/ripu.log get_md5=False get_mime=True get_attributes=True Feb 17 07:35:10 managed-node01 ansible-ansible.legacy.command[23124]: Invoked with executable=/bin/bash _uses_shell=True strip_empty_ends=True _raw_params=set -euxo pipefail rm -f /var/log/leapp/leapp-upgrade.log rm -f /var/log/ripu/ripu.log* removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Feb 17 07:35:10 managed-node01 sshd[23137]: Accepted publickey for root from 10.31.8.42 port 33558 ssh2: RSA SHA256:9j1blwt3wcrRiGYZQ7ZGu9axm3cDklH6/z4c+Ee8CzE Feb 17 07:35:10 managed-node01 chronyd[545]: Selected source 10.2.32.38 Feb 17 07:35:10 managed-node01 systemd-logind[564]: New session 5 of user root. -- Subject: A new session 5 has been created for user root -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- Documentation: http://www.freedesktop.org/wiki/Software/systemd/multiseat -- -- A new session with the ID 5 has been created for the user root. -- -- The leading process of the session is 23137. Feb 17 07:35:10 managed-node01 systemd[1]: Started Session 5 of user root. -- Subject: Unit session-5.scope has finished start-up -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- -- Unit session-5.scope has finished starting up. -- -- The start-up result is done. Feb 17 07:35:10 managed-node01 sshd[23137]: pam_unix(sshd:session): session opened for user root by (uid=0) Feb 17 07:35:10 managed-node01 sshd[23137]: Received disconnect from 10.31.8.42 port 33558:11: disconnected by user Feb 17 07:35:10 managed-node01 sshd[23137]: Disconnected from 10.31.8.42 port 33558 Feb 17 07:35:10 managed-node01 sshd[23137]: pam_unix(sshd:session): session closed for user root Feb 17 07:35:10 managed-node01 systemd-logind[564]: Removed session 5. -- Subject: Session 5 has been terminated -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- Documentation: http://www.freedesktop.org/wiki/Software/systemd/multiseat -- -- A session with the ID 5 has been terminated. Feb 17 07:35:11 managed-node01 sshd[23149]: Accepted publickey for root from 10.31.8.42 port 33570 ssh2: RSA SHA256:9j1blwt3wcrRiGYZQ7ZGu9axm3cDklH6/z4c+Ee8CzE Feb 17 07:35:11 managed-node01 systemd-logind[564]: New session 6 of user root. -- Subject: A new session 6 has been created for user root -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- Documentation: http://www.freedesktop.org/wiki/Software/systemd/multiseat -- -- A new session with the ID 6 has been created for the user root. -- -- The leading process of the session is 23149. Feb 17 07:35:11 managed-node01 systemd[1]: Started Session 6 of user root. -- Subject: Unit session-6.scope has finished start-up -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- -- Unit session-6.scope has finished starting up. -- -- The start-up result is done. Feb 17 07:35:11 managed-node01 sshd[23149]: pam_unix(sshd:session): session opened for user root by (uid=0)