[WARNING]: Collection infra.leapp does not support Ansible version 2.14.18 [WARNING]: running playbook inside collection infra.leapp ansible-playbook [core 2.14.18] config file = /etc/ansible/ansible.cfg configured module search path = ['/root/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] ansible python module location = /usr/lib/python3.9/site-packages/ansible ansible collection location = /root/.ansible/collections:/usr/share/ansible/collections executable location = /usr/bin/ansible-playbook python version = 3.9.25 (main, Jan 14 2026, 00:00:00) [GCC 11.5.0 20240719 (Red Hat 11.5.0-11)] (/usr/bin/python3) jinja version = 3.1.2 libyaml = True Using /etc/ansible/ansible.cfg as config file Skipping callback 'default', as we already have a stdout callback. Skipping callback 'minimal', as we already have a stdout callback. Skipping callback 'oneline', as we already have a stdout callback. PLAYBOOK: tests_remediations_9to10.yml ***************************************** 1 plays in /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_remediations_9to10.yml PLAY [Test RHEL 9 to 10 remediations] ****************************************** TASK [Gathering Facts] ********************************************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_remediations_9to10.yml:2 ok: [managed-node01] TASK [Include tests_upgrade_custom playbook] *********************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_remediations_9to10.yml:22 included: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/tests_upgrade_custom.yml for managed-node01 TASK [tests_upgrade_custom | Check if leapp upgrade log exists] **************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/tests_upgrade_custom.yml:12 ok: [managed-node01] => {"changed": false, "stat": {"exists": false}} TASK [tests_upgrade_custom | Skip test if already upgraded or not RHEL {{ rhel_base_ver }}] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/tests_upgrade_custom.yml:17 META: end_play conditional evaluated to False, continuing play skipping: [managed-node01] => {"msg": "end_play", "skip_reason": "end_play conditional evaluated to False, continuing play"} TASK [tests_upgrade_custom | Include common upgrade tasks] ********************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/tests_upgrade_custom.yml:27 included: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml for managed-node01 TASK [common_upgrade_tasks | Remove leapp packages] **************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:6 changed: [managed-node01] => {"changed": true, "msg": "", "rc": 0, "results": ["Removed: leapp-upgrade-el9toel10-0.23.0-1.el9.noarch"]} TASK [common_upgrade_tasks | Gather setup tasks] ******************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:11 ok: [managed-node01 -> localhost] => {"changed": false, "examined": 4, "files": [{"atime": 1771331177.693338, "ctime": 1771331177.5463367, "dev": 51716, "gid": 0, "gr_name": "root", "inode": 763363522, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1771331177.5463367, "nlink": 1, "path": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_cifs.yml", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 272, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}, {"atime": 1771331177.693338, "ctime": 1771331177.5463367, "dev": 51716, "gid": 0, "gr_name": "root", "inode": 763363523, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1771331177.5463367, "nlink": 1, "path": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_remote_using_root.yml", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 268, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}, {"atime": 1771331177.693338, "ctime": 1771331177.5463367, "dev": 51716, "gid": 0, "gr_name": "root", "inode": 763363524, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1771331177.5463367, "nlink": 1, "path": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_removed_kernel_drivers.yml", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 913, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}, {"atime": 1771331177.693338, "ctime": 1771331177.5463367, "dev": 51716, "gid": 0, "gr_name": "root", "inode": 763363525, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1771331177.5463367, "nlink": 1, "path": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/version_lock.yml", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 548, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}], "matched": 4, "msg": "All paths examined", "skipped_paths": {}} TASK [common_upgrade_tasks | Do remediation setup tasks] *********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:18 included: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_cifs.yml for managed-node01 => (item=/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_cifs.yml) included: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_remote_using_root.yml for managed-node01 => (item=/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_remote_using_root.yml) included: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_removed_kernel_drivers.yml for managed-node01 => (item=/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_removed_kernel_drivers.yml) TASK [setup | remediate_cifs | Add a CIFS share to /etc/fstab] ***************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_cifs.yml:3 changed: [managed-node01] => {"backup": "", "changed": true, "msg": "line added"} TASK [setup | remediate_remote_using_root | Set the parameter to not remediate SSH password authentication] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_remote_using_root.yml:3 ok: [managed-node01] => {"ansible_facts": {"leapp_remediate_ssh_password_auth": false}, "changed": false} TASK [setup | remediate_removed_kernel_drivers | Set list of test kernel modules] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_removed_kernel_drivers.yml:4 ok: [managed-node01] => {"ansible_facts": {"leapp_test_kernel_modules": ["qla3xxx", "vmw_pvrdma"]}, "changed": false} TASK [setup | remediate_removed_kernel_drivers | Load the test kernel modules] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_removed_kernel_drivers.yml:21 TASK [infra.leapp.common : manage_kernel_modules | Load or unload kernel modules] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_kernel_modules.yml:5 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml for managed-node01 => (item=qla3xxx) included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml for managed-node01 => (item=vmw_pvrdma) TASK [infra.leapp.common : manage_one_kernel_module | Load or unload kernel module] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:5 changed: [managed-node01] => {"changed": true, "name": "qla3xxx", "params": "", "state": "present"} TASK [infra.leapp.common : manage_one_kernel_module | Disable modules-load.d file entry] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:17 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : manage_one_kernel_module | Ensure modules are not loaded at boot] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:25 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : manage_one_kernel_module | Debug modprobe.d file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:33 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : manage_one_kernel_module | Debug modules-load.d file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:37 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : manage_one_kernel_module | Load or unload kernel module] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:5 changed: [managed-node01] => {"changed": true, "name": "vmw_pvrdma", "params": "", "state": "present"} TASK [infra.leapp.common : manage_one_kernel_module | Disable modules-load.d file entry] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:17 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : manage_one_kernel_module | Ensure modules are not loaded at boot] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:25 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : manage_one_kernel_module | Debug modprobe.d file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:33 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : manage_one_kernel_module | Debug modules-load.d file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:37 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [common_upgrade_tasks | Do setup tasks] *********************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:29 skipping: [managed-node01] => (item=/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/version_lock.yml) => {"ansible_loop_var": "setup_task_file", "changed": false, "setup_task_file": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/version_lock.yml", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => {"changed": false, "msg": "All items skipped"} TASK [common_upgrade_tasks | Run first analysis] ******************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:40 TASK [infra.leapp.common : Log directory exists] ******************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:3 ok: [managed-node01] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/var/log/ripu", "secontext": "unconfined_u:object_r:var_log_t:s0", "size": 6, "state": "directory", "uid": 0} TASK [infra.leapp.common : Check for existing log file] ************************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:11 ok: [managed-node01] => {"changed": false, "stat": {"exists": false}} TASK [infra.leapp.common : Fail if log file already exists] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:16 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : Create new log file] ******************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:23 NOTIFIED HANDLER infra.leapp.common : Check for log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Add end time to log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Slurp ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Decode ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Rename log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Check for log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Add end time to log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Slurp ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Decode ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Rename log file for managed-node01 changed: [managed-node01] => {"changed": true, "checksum": "2e41ec137fcd95caf8e96bfc9b19e48e7ced8a6d", "dest": "/var/log/ripu/ripu.log", "gid": 0, "group": "root", "md5sum": "a400bc3f750efb09eb64e1a18ae3696c", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:var_log_t:s0", "size": 61, "src": "/root/.ansible/tmp/ansible-tmp-1771331588.4467087-9604-120481524519547/source", "state": "file", "uid": 0} TASK [infra.leapp.common : /etc/ansible/facts.d directory exists] ************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:35 ok: [managed-node01] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc/ansible/facts.d", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 57, "state": "directory", "uid": 0} TASK [infra.leapp.common : Capture current ansible_facts for validation after upgrade] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:43 changed: [managed-node01] => {"changed": true, "checksum": "b106720fdd239397dba5da37ef8d75b7fc2b1411", "dest": "/etc/ansible/facts.d/pre_ripu.fact", "gid": 0, "group": "root", "md5sum": "0eb357e3e6190ba8782fc5d5231f42ab", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:etc_t:s0", "size": 14654, "src": "/root/.ansible/tmp/ansible-tmp-1771331589.7646363-9730-72098367620653/source", "state": "file", "uid": 0} TASK [infra.leapp.common : Capture a list of non-rhel versioned packages] ****** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:51 ok: [managed-node01] => {"changed": false, "cmd": "set -o pipefail; export PATH=$PATH; rpm -qa | grep -ve '[\\.|+]el9' | grep -vE '^(gpg-pubkey|libmodulemd|katello-ca-consumer)' | sort", "delta": "0:00:00.234613", "end": "2026-02-17 07:33:11.217969", "failed_when_result": false, "msg": "non-zero return code", "rc": 1, "start": "2026-02-17 07:33:10.983356", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} TASK [infra.leapp.common : Create fact with the non-rhel versioned packages list] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:65 ok: [managed-node01] => {"ansible_facts": {"non_rhel_packages": []}, "changed": false} TASK [infra.leapp.common : Capture the list of non-rhel versioned packages in a separate fact file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:69 ok: [managed-node01] => {"changed": false, "checksum": "97d170e1550eee4afc0af065b78cda302a97674c", "dest": "/etc/ansible/facts.d/non_rhel_packages.fact", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/ansible/facts.d/non_rhel_packages.fact", "secontext": "system_u:object_r:etc_t:s0", "size": 2, "state": "file", "uid": 0} TASK [infra.leapp.analysis : Include tasks for preupg assistant analysis] ****** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:9 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : Include tasks for leapp preupgrade analysis] ****** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:13 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml for managed-node01 TASK [analysis-leapp | Register with Satellite activation key] ***************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:2 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [analysis-leapp | Include custom_local_repos for local_repos_pre_leapp] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:11 TASK [infra.leapp.common : custom_local_repos | Remove old /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:2 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : custom_local_repos | Validate repo definitions have baseurl or metalink] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:9 skipping: [managed-node01] => {"changed": false, "skipped_reason": "No items in the list"} TASK [infra.leapp.common : custom_local_repos | Enable custom upgrade yum repositories] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:16 skipping: [managed-node01] => {"changed": false, "skipped_reason": "No items in the list"} TASK [infra.leapp.analysis : analysis-leapp | Install packages for preupgrade analysis on RHEL 7] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:19 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : analysis-leapp | Install packages for preupgrade analysis on RHEL 8] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:26 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : analysis-leapp | Install packages for preupgrade analysis on RHEL 9] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:33 changed: [managed-node01] => {"changed": true, "msg": "", "rc": 0, "results": ["Installed: leapp-upgrade-el9toel10-0.23.0-1.el9.noarch"]} TASK [infra.leapp.analysis : analysis-leapp | Ensure leapp log directory exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:40 ok: [managed-node01] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/var/log/leapp", "secontext": "system_u:object_r:var_log_t:s0", "size": 118, "state": "directory", "uid": 0} TASK [infra.leapp.analysis : analysis-leapp | Populate leapp_answers file] ***** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:48 changed: [managed-node01] => {"changed": true, "checksum": "3d934ad808576e3a7fb4c14a89645a4ad55ccf53", "dest": "/var/log/leapp/answerfile", "gid": 0, "group": "root", "md5sum": "01e375235c8e4cafdec593b260354063", "mode": "0644", "owner": "root", "secontext": "unconfined_u:object_r:var_log_t:s0", "size": 48, "src": "/root/.ansible/tmp/ansible-tmp-1771331595.5507636-9917-48722096681825/source", "state": "file", "uid": 0} TASK [analysis-leapp | Create /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:57 TASK [infra.leapp.common : custom_local_repos | Remove old /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:2 ok: [managed-node01] => {"changed": false, "path": "/etc/leapp/files/leapp_upgrade_repositories.repo", "state": "absent"} TASK [infra.leapp.common : custom_local_repos | Validate repo definitions have baseurl or metalink] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:9 ok: [managed-node01] => (item={'name': 'rhel-10-for-x86_64-baseos-rpms', 'description': 'BaseOS for x86_64', 'baseurl': 'http://download.devel.redhat.com/rhel-10/nightly/updates/RHEL-10/latest-RHEL-10.1/compose/BaseOS/x86_64/os/', 'state': 'present'}) => { "ansible_loop_var": "item", "changed": false, "item": { "baseurl": "http://download.devel.redhat.com/rhel-10/nightly/updates/RHEL-10/latest-RHEL-10.1/compose/BaseOS/x86_64/os/", "description": "BaseOS for x86_64", "name": "rhel-10-for-x86_64-baseos-rpms", "state": "present" }, "msg": "All assertions passed" } ok: [managed-node01] => (item={'name': 'rhel-10-for-x86_64-appstream-rpms', 'description': 'AppStream for x86_64', 'baseurl': 'http://download.devel.redhat.com/rhel-10/nightly/updates/RHEL-10/latest-RHEL-10.1/compose/AppStream/x86_64/os/', 'state': 'present'}) => { "ansible_loop_var": "item", "changed": false, "item": { "baseurl": "http://download.devel.redhat.com/rhel-10/nightly/updates/RHEL-10/latest-RHEL-10.1/compose/AppStream/x86_64/os/", "description": "AppStream for x86_64", "name": "rhel-10-for-x86_64-appstream-rpms", "state": "present" }, "msg": "All assertions passed" } TASK [infra.leapp.common : custom_local_repos | Enable custom upgrade yum repositories] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:16 changed: [managed-node01] => (item={'name': 'rhel-10-for-x86_64-baseos-rpms', 'description': 'BaseOS for x86_64', 'baseurl': 'http://download.devel.redhat.com/rhel-10/nightly/updates/RHEL-10/latest-RHEL-10.1/compose/BaseOS/x86_64/os/', 'state': 'present'}) => {"ansible_loop_var": "item", "changed": true, "item": {"baseurl": "http://download.devel.redhat.com/rhel-10/nightly/updates/RHEL-10/latest-RHEL-10.1/compose/BaseOS/x86_64/os/", "description": "BaseOS for x86_64", "name": "rhel-10-for-x86_64-baseos-rpms", "state": "present"}, "repo": "rhel-10-for-x86_64-baseos-rpms", "state": "present"} changed: [managed-node01] => (item={'name': 'rhel-10-for-x86_64-appstream-rpms', 'description': 'AppStream for x86_64', 'baseurl': 'http://download.devel.redhat.com/rhel-10/nightly/updates/RHEL-10/latest-RHEL-10.1/compose/AppStream/x86_64/os/', 'state': 'present'}) => {"ansible_loop_var": "item", "changed": true, "item": {"baseurl": "http://download.devel.redhat.com/rhel-10/nightly/updates/RHEL-10/latest-RHEL-10.1/compose/AppStream/x86_64/os/", "description": "AppStream for x86_64", "name": "rhel-10-for-x86_64-appstream-rpms", "state": "present"}, "repo": "rhel-10-for-x86_64-appstream-rpms", "state": "present"} TASK [infra.leapp.analysis : analysis-leapp | Leapp preupgrade report] ********* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:68 ASYNC FAILED on managed-node01: jid=j35166807842.13035 changed: [managed-node01] => {"ansible_job_id": "j35166807842.13035", "changed": true, "cmd": "set -o pipefail; export PATH=$PATH; ulimit -n 16384; leapp preupgrade --report-schema=1.2.0 --no-rhsm 2>&1 | tee -a /var/log/ripu/ripu.log\n", "delta": "0:00:26.623457", "end": "2026-02-17 07:33:45.001789", "failed_when_result": false, "finished": 1, "msg": "non-zero return code", "rc": 1, "results_file": "/root/.ansible_async/j35166807842.13035", "start": "2026-02-17 07:33:18.378332", "started": 1, "stderr": "", "stderr_lines": [], "stdout": "\n============================================================\n UNSUPPORTED UPGRADE \n============================================================\n\nVariable LEAPP_UNSUPPORTED has been detected. Proceeding at your own risk.\nDevelopment variables have been detected:\n- LEAPP_DEVEL_RPMS_ALL_SIGNED=1\n\n============================================================\n UNSUPPORTED UPGRADE \n============================================================\n\n==> Processing phase `configuration_phase`\n====> * ipu_workflow_config\n IPU workflow config actor\n==> Processing phase `FactsCollection`\n====> * scan_source_files\n Scan files (explicitly specified) of the source system.\n====> * scan_grub_device_name\n Find the name of the block devices where GRUB is located\n====> * scan_sap_hana\n Gathers information related to SAP HANA instances on the system.\n====> * transaction_workarounds\n Provides additional RPM transaction tasks based on bundled RPM packages.\n====> * scanmemory\n Scan Memory of the machine.\n====> * read_openssh_config\n Collect information about the OpenSSH configuration.\n====> * migrate_rpm_db\n Register a workaround to migrate RPM DB during the upgrade.\n====> * scan_kernel_cmdline\n Scan the kernel command line of the booted system.\n====> * scan_pkg_manager\n Provides data about package manager (yum/dnf)\n====> * scan_subscription_manager_info\n Scans the current system for subscription manager information\n====> * register_ruby_irb_adjustment\n Register a workaround to allow rubygem-irb's symlink -> directory conversion.\n====> * scan_target_os_image\n Scans the provided target OS ISO image to use as a content source for the IPU, if any.\n====> * scanzfcp\n In case of s390x architecture, check whether ZFCP is used.\n====> * persistentnetnames\n Get network interface information for physical ethernet interfaces of the original system.\n====> * open_ssl_config_scanner\n Read an OpenSSL configuration file for further analysis.\n====> * scan_pam_user_db\n Scan the PAM service folder for the location of pam_userdb databases\n====> * udevadm_info\n Produces data exported by the \"udevadm info\" command.\n====> * sssd_facts\n Check SSSD configuration for changes in RHEL10 and report them in model.\n====> * scan_source_boot_entry\n Scan the default boot entry of the source system.\n====> * storage_scanner\n Provides data about storage settings.\n====> * repository_mapping\n Produces message containing repository mapping based on provided file.\n====> * ifcfg_scanner\n Scan ifcfg files with legacy network configuration\n====> * root_scanner\n Scan the system root directory and produce a message containing\n====> * scanclienablerepo\n Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.\n====> * system_facts\n Provides data about many facts from system.\n====> * get_enabled_modules\n Provides data about which module streams are enabled on the source system.\n====> * satellite_upgrade_services\n Reconfigure Satellite services\n====> * xfs_info_scanner\n This actor scans all mounted mountpoints for XFS information.\n====> * scan_fips\n Determine whether the source system has FIPS enabled.\n====> * luks_scanner\n Provides data about active LUKS devices.\n====> * biosdevname\n Enable biosdevname on the target RHEL system if all interfaces on the source RHEL\n====> * rpm_scanner\n Provides data about installed RPM Packages.\n====> * scan_systemd_source\n Provides info about systemd on the source system\n====> * scan_default_initramfs\n Scan details of the default boot entry's initramfs image.\n====> * scandasd\n In case of s390x architecture, check whether DASD is used.\n====> * checkrhui\n Check if system is using RHUI infrastructure (on public cloud) and send messages to\n====> * scan_custom_repofile\n Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.\n====> * copy_dnf_conf_into_target_userspace\n Copy dnf.conf into target userspace\n====> * scan_grub_config\n Scan grub configuration files for errors.\n====> * scan_files_for_target_userspace\n Scan the source system and identify files that will be copied into the target userspace when it is created.\n====> * scancryptopolicies\n Scan information about system wide set crypto policies including:\n====> * network_manager_read_config\n Provides data about NetworkManager configuration.\n====> * load_device_driver_deprecation_data\n Loads deprecation data for drivers and devices (PCI & CPU)\n====> * scan_custom_modifications_actor\n Collects information about files in leapp directories that have been modified or newly added.\n====> * persistentnetnamesdisable\n Disable systemd-udevd persistent network naming on machine with single eth0 NIC\n====> * pci_devices_scanner\n Provides data about existing PCI Devices.\n====> * scan_hybrid_image_azure\n Check if the system is using Azure hybrid image.\n====> * remove_obsolete_gpg_keys\n Remove obsoleted RPM GPG keys.\n====> * trusted_gpg_keys_scanner\n Scan for trusted GPG keys.\n====> * selinuxcontentscanner\n Scan the system for any SELinux customizations\n====> * distribution_signed_rpm_scanner\n Provide data about distribution signed & third-party RPM packages.\n====> * ipa_scanner\n Scan system for ipa-client and ipa-server status\n====> * get_installed_desktops\n Actor checks if kde or gnome desktop environments\n====> * detect_kernel_drivers\n Matches all currently loaded kernel drivers against known deprecated and removed drivers.\n====> * repositories_blacklist\n Exclude target repositories provided by Red Hat without support.\n====> * scan_mysql\n Actor checking for presence of MySQL installation.\n====> * scancpu\n Scan CPUs of the machine.\n====> * scan_dynamic_linker_configuration\n Scan the dynamic linker configuration and find modifications.\n====> * rpm_transaction_config_tasks_collector\n Provides additional RPM transaction tasks from /etc/leapp/transaction.\n====> * scan_source_kernel\n Scan the source system kernel.\n====> * pes_events_scanner\n Provides data about package events from Package Evolution Service.\n====> * used_repository_scanner\n Scan used enabled repositories\n====> * setuptargetrepos\n Produces list of repositories that should be available to be used during IPU process.\n==> Processing phase `Checks`\n====> * check_pam_user_db\n Create report with the location of pam_userdb databases\n====> * mysql_check\n Actor checking for output produced by scanmysql actor.\n====> * check_persistent_mounts\n Check if mounts required to be persistent are mounted in persistent fashion.\n====> * check_old_xfs\n Check mounted XFS file systems.\n====> * check_ipa_server\n Check for ipa-server and inhibit upgrade\n====> * network_deprecations\n Ensures that network configuration doesn't rely on unsupported settings\n====> * check_skipped_repositories\n Produces a report if any repositories enabled on the system are going to be skipped.\n====> * efi_check_boot\n Adjust EFI boot entry for first reboot\n====> * inhibit_cgroupsv1\n Inhibit upgrade if cgroups-v1 are enabled\n====> * checkmemory\n The actor check the size of RAM against RHEL8 minimal hardware requirements\n====> * libdb_check\n Actor checking for presence of libdb(Berkeley DB) installation.\n====> * check_microarchitecture\n Inhibit if RHEL9 microarchitecture requirements are not satisfied\n====> * openssh_permit_root_login\n OpenSSH no longer allows root logins with password.\n====> * mariadb_check\n Actor checking for presence of MariaDB installation.\n====> * check_mount_options\n Check for mount options preventing the upgrade.\n====> * open_ssl_engines_check\n The OpenSSL in RHEL 10 has deprecated engines in favor of providers.\n====> * check_nfs\n Check if NFS filesystem is in use. If yes, inhibit the upgrade process.\n====> * check_rhsmsca\n Ensure that a registered system is in SCA (Simple Content Access)\n====> * check_rhsmsku\n Ensure the system is subscribed to the subscription manager\n====> * check_os_release\n Check if the current RHEL minor version is supported. If not, inhibit the upgrade process.\n====> * check_openssl_conf\n Check whether the openssl configuration and openssl-IBMCA.\n====> * check_se_linux\n Check SELinux status and produce decision messages for further action.\n====> * check_sap_hana\n If SAP HANA has been detected, several checks are performed to ensure a successful upgrade.\n====> * postgresql_check\n Actor checking for presence of PostgreSQL installation.\n====> * check_root_symlinks\n Check if the symlinks /bin and /lib are relative, not absolute.\n====> * detect_grub_config_error\n Check grub configuration for various errors.\n====> * check_dynamic_linker_configuration\n Check for customization of dynamic linker configuration.\n====> * crypto_policies_check\n This actor consumes previously gathered information about crypto policies on the source\n====> * check_fstab_mount_order\n Checks order of entries in /etc/fstab based on their mount point and inhibits upgrade if overshadowing is detected.\n====> * check_target_version\n Check that the target system version is supported by the upgrade process.\n====> * check_etc_releasever\n Check releasever info and provide a guidance based on the facts\n====> * check_yum_plugins_enabled\n Checks that the required yum plugins are enabled.\n====> * check_detected_devices_and_drivers\n Checks whether or not detected devices and drivers are usable on the target system.\n====> * check_systemd_broken_symlinks\n Check whether some systemd symlinks are broken\n====> * check_insights_auto_register\n Checks if system can be automatically registered into Red Hat Insights\n====> * checktargetrepos\n Check whether target yum repositories are specified.\n====> * check_fips\n Inhibit upgrade if FIPS is detected as enabled.\n====> * distribution_signed_rpm_check\n Check if there are any packages that are not signed by distribution GPG keys.\n====> * check_grub_core\n Check whether we are on legacy (BIOS) system and instruct Leapp to upgrade GRUB core\n====> * bacula_check\n Actor checking for presence of Bacula installation.\n====> * sssd_check\n Check SSSD configuration for changes in RHEL10 and report them in model.\n====> * check_system_arch\n Check if system is running at a supported architecture. If no, inhibit the upgrade process.\n====> * check_target_iso\n Check that the provided target ISO is a valid ISO image and is located on a persistent partition.\n====> * cephvolumescan\n Retrieves the list of encrypted Ceph OSD\n====> * unsupported_upgrade_check\n Checks environment variables and produces a warning report if the upgrade is unsupported.\n====> * check_grubenv_to_file\n Check whether grubenv is a symlink on Azure hybrid images using BIOS.\n====> * check_boot_avail_space\n Check if at least 100Mib of available space on /boot. If not, inhibit the upgrade process.\n====> * check_default_initramfs\n Checks whether the default initramfs uses problematic dracut modules.\n====> * check_cifs\n Check if CIFS filesystem is in use. If yes, inhibit the upgrade process.\n====> * check_consumed_assets\n Check whether Leapp is using correct data assets.\n====> * check_custom_modifications_actor\n Checks CustomModifications messages and produces a report about files in leapp directories that have been\n====> * check_installed_kernels\n Inhibit IPU (in-place upgrade) when installed kernels conflict with a safe upgrade.\n====> * check_luks\n Check if any encrypted partitions are in use and whether they are supported for the upgrade.\n====> * check_skip_phase\n Skip all the subsequent phases until the report phase.\n====> * check_rpm_transaction_events\n Filter RPM transaction events based on installed RPM packages\n==> Processing phase `Reports`\n====> * verify_check_results\n Check all dialogs and notify that user needs to make some choices.\n====> * verify_check_results\n Check all generated results messages and notify user about them.\n\nDebug output written to /var/log/leapp/leapp-preupgrade.log\n\n============================================================\n REPORT OVERVIEW \n============================================================\n\nUpgrade has been inhibited due to the following problems:\n 1. Legacy network configuration found\n 2. Use of NFS detected. Upgrade can't proceed\n 3. Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\n 4. Use of CIFS detected. Upgrade can't proceed\n\nHIGH and MEDIUM severity reports:\n 1. Leapp detected a processor which is no longer maintained in RHEL 10.\n 2. GRUB2 core will be automatically updated during the upgrade\n 3. Upgrade is unsupported\n 4. Berkeley DB (libdb) has been detected on your system\n\nReports summary:\n Errors: 0\n Inhibitors: 4\n HIGH severity reports: 3\n MEDIUM severity reports: 1\n LOW severity reports: 1\n INFO severity reports: 2\n\nBefore continuing, review the full report below for details about discovered problems and possible remediation instructions:\n A report has been generated at /var/log/leapp/leapp-report.txt\n A report has been generated at /var/log/leapp/leapp-report.json\n\n============================================================\n END OF REPORT OVERVIEW \n============================================================\n\nAnswerfile has been generated at /var/log/leapp/answerfile", "stdout_lines": ["", "============================================================", " UNSUPPORTED UPGRADE ", "============================================================", "", "Variable LEAPP_UNSUPPORTED has been detected. Proceeding at your own risk.", "Development variables have been detected:", "- LEAPP_DEVEL_RPMS_ALL_SIGNED=1", "", "============================================================", " UNSUPPORTED UPGRADE ", "============================================================", "", "==> Processing phase `configuration_phase`", "====> * ipu_workflow_config", " IPU workflow config actor", "==> Processing phase `FactsCollection`", "====> * scan_source_files", " Scan files (explicitly specified) of the source system.", "====> * scan_grub_device_name", " Find the name of the block devices where GRUB is located", "====> * scan_sap_hana", " Gathers information related to SAP HANA instances on the system.", "====> * transaction_workarounds", " Provides additional RPM transaction tasks based on bundled RPM packages.", "====> * scanmemory", " Scan Memory of the machine.", "====> * read_openssh_config", " Collect information about the OpenSSH configuration.", "====> * migrate_rpm_db", " Register a workaround to migrate RPM DB during the upgrade.", "====> * scan_kernel_cmdline", " Scan the kernel command line of the booted system.", "====> * scan_pkg_manager", " Provides data about package manager (yum/dnf)", "====> * scan_subscription_manager_info", " Scans the current system for subscription manager information", "====> * register_ruby_irb_adjustment", " Register a workaround to allow rubygem-irb's symlink -> directory conversion.", "====> * scan_target_os_image", " Scans the provided target OS ISO image to use as a content source for the IPU, if any.", "====> * scanzfcp", " In case of s390x architecture, check whether ZFCP is used.", "====> * persistentnetnames", " Get network interface information for physical ethernet interfaces of the original system.", "====> * open_ssl_config_scanner", " Read an OpenSSL configuration file for further analysis.", "====> * scan_pam_user_db", " Scan the PAM service folder for the location of pam_userdb databases", "====> * udevadm_info", " Produces data exported by the \"udevadm info\" command.", "====> * sssd_facts", " Check SSSD configuration for changes in RHEL10 and report them in model.", "====> * scan_source_boot_entry", " Scan the default boot entry of the source system.", "====> * storage_scanner", " Provides data about storage settings.", "====> * repository_mapping", " Produces message containing repository mapping based on provided file.", "====> * ifcfg_scanner", " Scan ifcfg files with legacy network configuration", "====> * root_scanner", " Scan the system root directory and produce a message containing", "====> * scanclienablerepo", " Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.", "====> * system_facts", " Provides data about many facts from system.", "====> * get_enabled_modules", " Provides data about which module streams are enabled on the source system.", "====> * satellite_upgrade_services", " Reconfigure Satellite services", "====> * xfs_info_scanner", " This actor scans all mounted mountpoints for XFS information.", "====> * scan_fips", " Determine whether the source system has FIPS enabled.", "====> * luks_scanner", " Provides data about active LUKS devices.", "====> * biosdevname", " Enable biosdevname on the target RHEL system if all interfaces on the source RHEL", "====> * rpm_scanner", " Provides data about installed RPM Packages.", "====> * scan_systemd_source", " Provides info about systemd on the source system", "====> * scan_default_initramfs", " Scan details of the default boot entry's initramfs image.", "====> * scandasd", " In case of s390x architecture, check whether DASD is used.", "====> * checkrhui", " Check if system is using RHUI infrastructure (on public cloud) and send messages to", "====> * scan_custom_repofile", " Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.", "====> * copy_dnf_conf_into_target_userspace", " Copy dnf.conf into target userspace", "====> * scan_grub_config", " Scan grub configuration files for errors.", "====> * scan_files_for_target_userspace", " Scan the source system and identify files that will be copied into the target userspace when it is created.", "====> * scancryptopolicies", " Scan information about system wide set crypto policies including:", "====> * network_manager_read_config", " Provides data about NetworkManager configuration.", "====> * load_device_driver_deprecation_data", " Loads deprecation data for drivers and devices (PCI & CPU)", "====> * scan_custom_modifications_actor", " Collects information about files in leapp directories that have been modified or newly added.", "====> * persistentnetnamesdisable", " Disable systemd-udevd persistent network naming on machine with single eth0 NIC", "====> * pci_devices_scanner", " Provides data about existing PCI Devices.", "====> * scan_hybrid_image_azure", " Check if the system is using Azure hybrid image.", "====> * remove_obsolete_gpg_keys", " Remove obsoleted RPM GPG keys.", "====> * trusted_gpg_keys_scanner", " Scan for trusted GPG keys.", "====> * selinuxcontentscanner", " Scan the system for any SELinux customizations", "====> * distribution_signed_rpm_scanner", " Provide data about distribution signed & third-party RPM packages.", "====> * ipa_scanner", " Scan system for ipa-client and ipa-server status", "====> * get_installed_desktops", " Actor checks if kde or gnome desktop environments", "====> * detect_kernel_drivers", " Matches all currently loaded kernel drivers against known deprecated and removed drivers.", "====> * repositories_blacklist", " Exclude target repositories provided by Red Hat without support.", "====> * scan_mysql", " Actor checking for presence of MySQL installation.", "====> * scancpu", " Scan CPUs of the machine.", "====> * scan_dynamic_linker_configuration", " Scan the dynamic linker configuration and find modifications.", "====> * rpm_transaction_config_tasks_collector", " Provides additional RPM transaction tasks from /etc/leapp/transaction.", "====> * scan_source_kernel", " Scan the source system kernel.", "====> * pes_events_scanner", " Provides data about package events from Package Evolution Service.", "====> * used_repository_scanner", " Scan used enabled repositories", "====> * setuptargetrepos", " Produces list of repositories that should be available to be used during IPU process.", "==> Processing phase `Checks`", "====> * check_pam_user_db", " Create report with the location of pam_userdb databases", "====> * mysql_check", " Actor checking for output produced by scanmysql actor.", "====> * check_persistent_mounts", " Check if mounts required to be persistent are mounted in persistent fashion.", "====> * check_old_xfs", " Check mounted XFS file systems.", "====> * check_ipa_server", " Check for ipa-server and inhibit upgrade", "====> * network_deprecations", " Ensures that network configuration doesn't rely on unsupported settings", "====> * check_skipped_repositories", " Produces a report if any repositories enabled on the system are going to be skipped.", "====> * efi_check_boot", " Adjust EFI boot entry for first reboot", "====> * inhibit_cgroupsv1", " Inhibit upgrade if cgroups-v1 are enabled", "====> * checkmemory", " The actor check the size of RAM against RHEL8 minimal hardware requirements", "====> * libdb_check", " Actor checking for presence of libdb(Berkeley DB) installation.", "====> * check_microarchitecture", " Inhibit if RHEL9 microarchitecture requirements are not satisfied", "====> * openssh_permit_root_login", " OpenSSH no longer allows root logins with password.", "====> * mariadb_check", " Actor checking for presence of MariaDB installation.", "====> * check_mount_options", " Check for mount options preventing the upgrade.", "====> * open_ssl_engines_check", " The OpenSSL in RHEL 10 has deprecated engines in favor of providers.", "====> * check_nfs", " Check if NFS filesystem is in use. If yes, inhibit the upgrade process.", "====> * check_rhsmsca", " Ensure that a registered system is in SCA (Simple Content Access)", "====> * check_rhsmsku", " Ensure the system is subscribed to the subscription manager", "====> * check_os_release", " Check if the current RHEL minor version is supported. If not, inhibit the upgrade process.", "====> * check_openssl_conf", " Check whether the openssl configuration and openssl-IBMCA.", "====> * check_se_linux", " Check SELinux status and produce decision messages for further action.", "====> * check_sap_hana", " If SAP HANA has been detected, several checks are performed to ensure a successful upgrade.", "====> * postgresql_check", " Actor checking for presence of PostgreSQL installation.", "====> * check_root_symlinks", " Check if the symlinks /bin and /lib are relative, not absolute.", "====> * detect_grub_config_error", " Check grub configuration for various errors.", "====> * check_dynamic_linker_configuration", " Check for customization of dynamic linker configuration.", "====> * crypto_policies_check", " This actor consumes previously gathered information about crypto policies on the source", "====> * check_fstab_mount_order", " Checks order of entries in /etc/fstab based on their mount point and inhibits upgrade if overshadowing is detected.", "====> * check_target_version", " Check that the target system version is supported by the upgrade process.", "====> * check_etc_releasever", " Check releasever info and provide a guidance based on the facts", "====> * check_yum_plugins_enabled", " Checks that the required yum plugins are enabled.", "====> * check_detected_devices_and_drivers", " Checks whether or not detected devices and drivers are usable on the target system.", "====> * check_systemd_broken_symlinks", " Check whether some systemd symlinks are broken", "====> * check_insights_auto_register", " Checks if system can be automatically registered into Red Hat Insights", "====> * checktargetrepos", " Check whether target yum repositories are specified.", "====> * check_fips", " Inhibit upgrade if FIPS is detected as enabled.", "====> * distribution_signed_rpm_check", " Check if there are any packages that are not signed by distribution GPG keys.", "====> * check_grub_core", " Check whether we are on legacy (BIOS) system and instruct Leapp to upgrade GRUB core", "====> * bacula_check", " Actor checking for presence of Bacula installation.", "====> * sssd_check", " Check SSSD configuration for changes in RHEL10 and report them in model.", "====> * check_system_arch", " Check if system is running at a supported architecture. If no, inhibit the upgrade process.", "====> * check_target_iso", " Check that the provided target ISO is a valid ISO image and is located on a persistent partition.", "====> * cephvolumescan", " Retrieves the list of encrypted Ceph OSD", "====> * unsupported_upgrade_check", " Checks environment variables and produces a warning report if the upgrade is unsupported.", "====> * check_grubenv_to_file", " Check whether grubenv is a symlink on Azure hybrid images using BIOS.", "====> * check_boot_avail_space", " Check if at least 100Mib of available space on /boot. If not, inhibit the upgrade process.", "====> * check_default_initramfs", " Checks whether the default initramfs uses problematic dracut modules.", "====> * check_cifs", " Check if CIFS filesystem is in use. If yes, inhibit the upgrade process.", "====> * check_consumed_assets", " Check whether Leapp is using correct data assets.", "====> * check_custom_modifications_actor", " Checks CustomModifications messages and produces a report about files in leapp directories that have been", "====> * check_installed_kernels", " Inhibit IPU (in-place upgrade) when installed kernels conflict with a safe upgrade.", "====> * check_luks", " Check if any encrypted partitions are in use and whether they are supported for the upgrade.", "====> * check_skip_phase", " Skip all the subsequent phases until the report phase.", "====> * check_rpm_transaction_events", " Filter RPM transaction events based on installed RPM packages", "==> Processing phase `Reports`", "====> * verify_check_results", " Check all dialogs and notify that user needs to make some choices.", "====> * verify_check_results", " Check all generated results messages and notify user about them.", "", "Debug output written to /var/log/leapp/leapp-preupgrade.log", "", "============================================================", " REPORT OVERVIEW ", "============================================================", "", "Upgrade has been inhibited due to the following problems:", " 1. Legacy network configuration found", " 2. Use of NFS detected. Upgrade can't proceed", " 3. Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.", " 4. Use of CIFS detected. Upgrade can't proceed", "", "HIGH and MEDIUM severity reports:", " 1. Leapp detected a processor which is no longer maintained in RHEL 10.", " 2. GRUB2 core will be automatically updated during the upgrade", " 3. Upgrade is unsupported", " 4. Berkeley DB (libdb) has been detected on your system", "", "Reports summary:", " Errors: 0", " Inhibitors: 4", " HIGH severity reports: 3", " MEDIUM severity reports: 1", " LOW severity reports: 1", " INFO severity reports: 2", "", "Before continuing, review the full report below for details about discovered problems and possible remediation instructions:", " A report has been generated at /var/log/leapp/leapp-report.txt", " A report has been generated at /var/log/leapp/leapp-report.json", "", "============================================================", " END OF REPORT OVERVIEW ", "============================================================", "", "Answerfile has been generated at /var/log/leapp/answerfile"]} TASK [analysis-leapp | Include custom_local_repos for local_repos_post_analysis] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:86 TASK [infra.leapp.common : custom_local_repos | Remove old /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:2 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : custom_local_repos | Validate repo definitions have baseurl or metalink] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:9 skipping: [managed-node01] => {"changed": false, "skipped_reason": "No items in the list"} TASK [infra.leapp.common : custom_local_repos | Enable custom upgrade yum repositories] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:16 skipping: [managed-node01] => {"changed": false, "skipped_reason": "No items in the list"} TASK [analysis-leapp | Restore original Satellite activation key] ************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:96 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : analysis-leapp | Include check-results-file.yml] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:107 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/check-results-file.yml for managed-node01 TASK [infra.leapp.analysis : check-results-file | Result file status] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/check-results-file.yml:2 ok: [managed-node01] => {"changed": false, "stat": {"atime": 1771331624.8459551, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 16, "charset": "us-ascii", "checksum": "6dce581c8141552a32a99a9d848375d84a6b2745", "ctime": 1771331624.8459551, "dev": 51716, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 310378645, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1771331624.8459551, "nlink": 1, "path": "/var/log/leapp/leapp-report.txt", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 7422, "uid": 0, "version": "3212909262", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} TASK [infra.leapp.analysis : check-results-file | Check that result file exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/check-results-file.yml:7 ok: [managed-node01] => { "changed": false, "msg": "All assertions passed" } TASK [analysis-leapp | Run parse_leapp_report to check for inhibitors] ********* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:110 TASK [infra.leapp.common : parse_leapp_report | Default upgrade_inhibited to false] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:12 ok: [managed-node01] => {"ansible_facts": {"upgrade_inhibited": false}, "changed": false} TASK [infra.leapp.common : parse_leapp_report | Collect human readable report results] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:16 ok: [managed-node01] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} TASK [infra.leapp.common : parse_leapp_report | Collect JSON report results] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:22 ok: [managed-node01] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} TASK [infra.leapp.common : parse_leapp_report | Parse report results] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:28 ok: [managed-node01] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} TASK [infra.leapp.common : parse_leapp_report | Clear leapp_inhibitors] ******** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:35 ok: [managed-node01] => {"ansible_facts": {"leapp_inhibitors": []}, "changed": false} TASK [infra.leapp.common : parse_leapp_report | Check for inhibitors] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:39 skipping: [managed-node01] => (item={'audience': 'sysadmin', 'detail': {'remediations': [{'context': 'If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).', 'type': 'hint'}]}, 'groups': ['repository', 'failure'], 'key': '1b9132cb2362ae7830e48eee7811be9527747de8', 'severity': 'info', 'summary': 'The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-for-rhel-10-aarch64-eus-rpms\n- codeready-builder-for-rhel-10-s390x-eus-rpms\n- codeready-builder-beta-for-rhel-10-x86_64-rpms\n- codeready-builder-for-rhel-10-x86_64-rpms\n- rhui-codeready-builder-for-rhel-10-x86_64-rhui-rpms\n- codeready-builder-for-rhel-10-s390x-rpms\n- codeready-builder-for-rhel-10-aarch64-rpms\n- codeready-builder-beta-for-rhel-10-ppc64le-rpms\n- codeready-builder-for-rhel-10-rhui-rpms\n- crb\n- codeready-builder-beta-for-rhel-10-s390x-rpms\n- codeready-builder-for-rhel-10-x86_64-eus-rpms\n- codeready-builder-for-rhel-10-ppc64le-eus-rpms\n- codeready-builder-for-rhel-10-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-10-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-10-aarch64-rpms', 'title': 'Excluded target system repositories', 'timeStamp': '2026-02-17T12:33:40.460799Z', 'hostname': 'managed-node01', 'actor': 'repositories_blacklist', 'id': '963c96fba78d27c7a94ca16f9b4a1ee6ce921cbf6e49a41a49a45ffa37e76e6f'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "repositories_blacklist", "audience": "sysadmin", "detail": {"remediations": [{"context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "type": "hint"}]}, "groups": ["repository", "failure"], "hostname": "managed-node01", "id": "963c96fba78d27c7a94ca16f9b4a1ee6ce921cbf6e49a41a49a45ffa37e76e6f", "key": "1b9132cb2362ae7830e48eee7811be9527747de8", "severity": "info", "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-for-rhel-10-aarch64-eus-rpms\n- codeready-builder-for-rhel-10-s390x-eus-rpms\n- codeready-builder-beta-for-rhel-10-x86_64-rpms\n- codeready-builder-for-rhel-10-x86_64-rpms\n- rhui-codeready-builder-for-rhel-10-x86_64-rhui-rpms\n- codeready-builder-for-rhel-10-s390x-rpms\n- codeready-builder-for-rhel-10-aarch64-rpms\n- codeready-builder-beta-for-rhel-10-ppc64le-rpms\n- codeready-builder-for-rhel-10-rhui-rpms\n- crb\n- codeready-builder-beta-for-rhel-10-s390x-rpms\n- codeready-builder-for-rhel-10-x86_64-eus-rpms\n- codeready-builder-for-rhel-10-ppc64le-eus-rpms\n- codeready-builder-for-rhel-10-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-10-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-10-aarch64-rpms", "timeStamp": "2026-02-17T12:33:40.460799Z", "title": "Excluded target system repositories"}, "skip_reason": "Conditional result was False"} ok: [managed-node01] => (item={'audience': 'sysadmin', 'detail': {'external': [{'title': 'How to migrate the connection from ifcfg to NetworkManager keyfile plugin?', 'url': 'https://access.redhat.com/solutions/7083803'}, {'title': 'nmcli(1) manual, describes "connection migrate" sub-command.', 'url': 'https://networkmanager.dev/docs/api/latest/nmcli.html'}, {'title': 'nm-settings-ifcfg-rh(5), description of the "ifcfg" format', 'url': 'https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html'}, {'title': 'nm-settings-keyfile(5), description of the "keyfile" format', 'url': 'https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html'}], 'related_resources': [{'scheme': 'package', 'title': 'NetworkManager'}, {'scheme': 'file', 'title': '/etc/sysconfig/network-scripts/ifcfg-eth0'}], 'remediations': [{'context': 'Convert the configuration into NetworkManager native "keyfile" format.', 'type': 'hint'}, {'context': ['nmcli', 'connection', 'migrate', '/etc/sysconfig/network-scripts/ifcfg-eth0'], 'type': 'command'}]}, 'groups': ['network', 'services', 'inhibitor'], 'key': '7de70b43c3c9d20075e30894ac24a4c4e2d70837', 'severity': 'high', 'summary': 'Network configuration files in legacy "ifcfg" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:\n - /etc/sysconfig/network-scripts/ifcfg-eth0', 'title': 'Legacy network configuration found', 'timeStamp': '2026-02-17T12:33:42.376946Z', 'hostname': 'managed-node01', 'actor': 'network_deprecations', 'id': '8d24099edf934f8c13ba6f4b320a6e7470fbe27711ac601bccd4c93821d06957'}) => {"ansible_facts": {"leapp_inhibitors": [{"actor": "network_deprecations", "audience": "sysadmin", "detail": {"external": [{"title": "How to migrate the connection from ifcfg to NetworkManager keyfile plugin?", "url": "https://access.redhat.com/solutions/7083803"}, {"title": "nmcli(1) manual, describes \"connection migrate\" sub-command.", "url": "https://networkmanager.dev/docs/api/latest/nmcli.html"}, {"title": "nm-settings-ifcfg-rh(5), description of the \"ifcfg\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html"}, {"title": "nm-settings-keyfile(5), description of the \"keyfile\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html"}], "related_resources": [{"scheme": "package", "title": "NetworkManager"}, {"scheme": "file", "title": "/etc/sysconfig/network-scripts/ifcfg-eth0"}], "remediations": [{"context": "Convert the configuration into NetworkManager native \"keyfile\" format.", "type": "hint"}, {"context": ["nmcli", "connection", "migrate", "/etc/sysconfig/network-scripts/ifcfg-eth0"], "type": "command"}]}, "groups": ["network", "services", "inhibitor"], "hostname": "managed-node01", "id": "8d24099edf934f8c13ba6f4b320a6e7470fbe27711ac601bccd4c93821d06957", "key": "7de70b43c3c9d20075e30894ac24a4c4e2d70837", "severity": "high", "summary": "Network configuration files in legacy \"ifcfg\" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:\n - /etc/sysconfig/network-scripts/ifcfg-eth0", "timeStamp": "2026-02-17T12:33:42.376946Z", "title": "Legacy network configuration found"}], "upgrade_inhibited": true}, "ansible_loop_var": "item", "changed": false, "item": {"actor": "network_deprecations", "audience": "sysadmin", "detail": {"external": [{"title": "How to migrate the connection from ifcfg to NetworkManager keyfile plugin?", "url": "https://access.redhat.com/solutions/7083803"}, {"title": "nmcli(1) manual, describes \"connection migrate\" sub-command.", "url": "https://networkmanager.dev/docs/api/latest/nmcli.html"}, {"title": "nm-settings-ifcfg-rh(5), description of the \"ifcfg\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html"}, {"title": "nm-settings-keyfile(5), description of the \"keyfile\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html"}], "related_resources": [{"scheme": "package", "title": "NetworkManager"}, {"scheme": "file", "title": "/etc/sysconfig/network-scripts/ifcfg-eth0"}], "remediations": [{"context": "Convert the configuration into NetworkManager native \"keyfile\" format.", "type": "hint"}, {"context": ["nmcli", "connection", "migrate", "/etc/sysconfig/network-scripts/ifcfg-eth0"], "type": "command"}]}, "groups": ["network", "services", "inhibitor"], "hostname": "managed-node01", "id": "8d24099edf934f8c13ba6f4b320a6e7470fbe27711ac601bccd4c93821d06957", "key": "7de70b43c3c9d20075e30894ac24a4c4e2d70837", "severity": "high", "summary": "Network configuration files in legacy \"ifcfg\" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:\n - /etc/sysconfig/network-scripts/ifcfg-eth0", "timeStamp": "2026-02-17T12:33:42.376946Z", "title": "Legacy network configuration found"}} skipping: [managed-node01] => (item={'audience': 'sysadmin', 'detail': {'external': [{'title': 'Migrating to a RHEL 10 without libdb', 'url': 'https://access.redhat.com/articles/7099256'}], 'related_resources': [{'scheme': 'package', 'title': 'libdb'}], 'remediations': [{'context': 'Back up your data before proceeding with the data upgrade/migration. For the conversion, the tool db_converter from the libdb-utils rpm could be used. This database format conversion must be performed before the system upgrade. The db_converter is not available in RHEL 10 systems. For more information, see the provided article.', 'type': 'hint'}]}, 'groups': ['services'], 'key': 'fdc8f5b084e95922a4f59485a807a92cae2fc738', 'severity': 'medium', 'summary': 'Libdb was marked as deprecated in RHEL-9 and in RHEL-10 is not included anymore. There are a couple of alternatives in RHEL-10; the applications that depend on libdb will not work. Such applications must implement another type of backend storage. And migrate existing data to the new database format.', 'title': 'Berkeley DB (libdb) has been detected on your system', 'timeStamp': '2026-02-17T12:33:42.594090Z', 'hostname': 'managed-node01', 'actor': 'libdb_check', 'id': '7474fdde07989120e2e7a01336e26c9b8db6e4693ef723c617f50934dff19718'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "libdb_check", "audience": "sysadmin", "detail": {"external": [{"title": "Migrating to a RHEL 10 without libdb", "url": "https://access.redhat.com/articles/7099256"}], "related_resources": [{"scheme": "package", "title": "libdb"}], "remediations": [{"context": "Back up your data before proceeding with the data upgrade/migration. For the conversion, the tool db_converter from the libdb-utils rpm could be used. This database format conversion must be performed before the system upgrade. The db_converter is not available in RHEL 10 systems. For more information, see the provided article.", "type": "hint"}]}, "groups": ["services"], "hostname": "managed-node01", "id": "7474fdde07989120e2e7a01336e26c9b8db6e4693ef723c617f50934dff19718", "key": "fdc8f5b084e95922a4f59485a807a92cae2fc738", "severity": "medium", "summary": "Libdb was marked as deprecated in RHEL-9 and in RHEL-10 is not included anymore. There are a couple of alternatives in RHEL-10; the applications that depend on libdb will not work. Such applications must implement another type of backend storage. And migrate existing data to the new database format.", "timeStamp": "2026-02-17T12:33:42.594090Z", "title": "Berkeley DB (libdb) has been detected on your system"}, "skip_reason": "Conditional result was False"} ok: [managed-node01] => (item={'audience': 'sysadmin', 'detail': {'external': [{'title': 'Why does leapp upgrade fail on detecting NFS during upgrade?', 'url': 'https://access.redhat.com/solutions/6964006'}], 'related_resources': [{'scheme': 'file', 'title': '/etc/fstab'}], 'remediations': [{'context': 'Disable NFS temporarily for the upgrade if possible.', 'type': 'hint'}]}, 'groups': ['filesystem', 'network', 'inhibitor'], 'key': '9881b25faceeeaa7a6478bcdac29afd7f6baaaed', 'severity': 'high', 'summary': 'NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n', 'title': "Use of NFS detected. Upgrade can't proceed", 'timeStamp': '2026-02-17T12:33:42.863531Z', 'hostname': 'managed-node01', 'actor': 'check_nfs', 'id': '944d673b326aa5baa992688de37be05f32fd0bad586d60e705e93b0488ab5a18'}) => {"ansible_facts": {"leapp_inhibitors": [{"actor": "network_deprecations", "audience": "sysadmin", "detail": {"external": [{"title": "How to migrate the connection from ifcfg to NetworkManager keyfile plugin?", "url": "https://access.redhat.com/solutions/7083803"}, {"title": "nmcli(1) manual, describes \"connection migrate\" sub-command.", "url": "https://networkmanager.dev/docs/api/latest/nmcli.html"}, {"title": "nm-settings-ifcfg-rh(5), description of the \"ifcfg\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html"}, {"title": "nm-settings-keyfile(5), description of the \"keyfile\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html"}], "related_resources": [{"scheme": "package", "title": "NetworkManager"}, {"scheme": "file", "title": "/etc/sysconfig/network-scripts/ifcfg-eth0"}], "remediations": [{"context": "Convert the configuration into NetworkManager native \"keyfile\" format.", "type": "hint"}, {"context": ["nmcli", "connection", "migrate", "/etc/sysconfig/network-scripts/ifcfg-eth0"], "type": "command"}]}, "groups": ["network", "services", "inhibitor"], "hostname": "managed-node01", "id": "8d24099edf934f8c13ba6f4b320a6e7470fbe27711ac601bccd4c93821d06957", "key": "7de70b43c3c9d20075e30894ac24a4c4e2d70837", "severity": "high", "summary": "Network configuration files in legacy \"ifcfg\" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:\n - /etc/sysconfig/network-scripts/ifcfg-eth0", "timeStamp": "2026-02-17T12:33:42.376946Z", "title": "Legacy network configuration found"}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "944d673b326aa5baa992688de37be05f32fd0bad586d60e705e93b0488ab5a18", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n", "timeStamp": "2026-02-17T12:33:42.863531Z", "title": "Use of NFS detected. Upgrade can't proceed"}], "upgrade_inhibited": true}, "ansible_loop_var": "item", "changed": false, "item": {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "944d673b326aa5baa992688de37be05f32fd0bad586d60e705e93b0488ab5a18", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n", "timeStamp": "2026-02-17T12:33:42.863531Z", "title": "Use of NFS detected. Upgrade can't proceed"}} skipping: [managed-node01] => (item={'audience': 'sysadmin', 'groups': ['selinux', 'security'], 'key': '8fb81863f8413bd617c2a55b69b8e10ff03d7c72', 'severity': 'info', 'summary': 'SElinux relabeling will be scheduled as the status is permissive/enforcing.', 'title': 'SElinux relabeling will be scheduled', 'timeStamp': '2026-02-17T12:33:43.128352Z', 'hostname': 'managed-node01', 'actor': 'check_se_linux', 'id': 'fc8d094d4994109bfaf925f16fd7b017ff7c0c0bfc3be9ff98ad3d16fb5c70b5'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_se_linux", "audience": "sysadmin", "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "fc8d094d4994109bfaf925f16fd7b017ff7c0c0bfc3be9ff98ad3d16fb5c70b5", "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", "severity": "info", "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", "timeStamp": "2026-02-17T12:33:43.128352Z", "title": "SElinux relabeling will be scheduled"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'audience': 'sysadmin', 'detail': {'remediations': [{'context': 'Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the "/root/tmp_leapp_py3" SElinux warnings.', 'type': 'hint'}]}, 'groups': ['selinux', 'security'], 'key': '39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f', 'severity': 'low', 'summary': 'SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.', 'title': 'SElinux will be set to permissive mode', 'timeStamp': '2026-02-17T12:33:43.130902Z', 'hostname': 'managed-node01', 'actor': 'check_se_linux', 'id': 'b507556f5e97bf99668711d29d2f46d4b011ef1fba75286625e323d933c048ba'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_se_linux", "audience": "sysadmin", "detail": {"remediations": [{"context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.", "type": "hint"}]}, "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "b507556f5e97bf99668711d29d2f46d4b011ef1fba75286625e323d933c048ba", "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", "severity": "low", "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", "timeStamp": "2026-02-17T12:33:43.130902Z", "title": "SElinux will be set to permissive mode"}, "skip_reason": "Conditional result was False"} ok: [managed-node01] => (item={'audience': 'sysadmin', 'detail': {'external': [{'title': 'Leapp preupgrade getting "Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed."', 'url': 'https://access.redhat.com/solutions/6971716'}, {'title': 'Leapp upgrade fail with error "Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed."', 'url': 'https://access.redhat.com/solutions/5436131'}]}, 'groups': ['kernel', 'drivers', 'inhibitor'], 'key': '48e04852631245aa4afee9adcdc7c2375b8cffb8', 'severity': 'high', 'summary': 'Support for the following RHEL 9 device drivers has been removed in RHEL 10:\n - qla3xxx\n - vmw_pvrdma\n', 'title': 'Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.', 'timeStamp': '2026-02-17T12:33:43.652561Z', 'hostname': 'managed-node01', 'actor': 'check_detected_devices_and_drivers', 'id': '78f1f2614f28e677d59d9c1f3c23c01817ce69040534a38311102c4743c73840'}) => {"ansible_facts": {"leapp_inhibitors": [{"actor": "network_deprecations", "audience": "sysadmin", "detail": {"external": [{"title": "How to migrate the connection from ifcfg to NetworkManager keyfile plugin?", "url": "https://access.redhat.com/solutions/7083803"}, {"title": "nmcli(1) manual, describes \"connection migrate\" sub-command.", "url": "https://networkmanager.dev/docs/api/latest/nmcli.html"}, {"title": "nm-settings-ifcfg-rh(5), description of the \"ifcfg\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html"}, {"title": "nm-settings-keyfile(5), description of the \"keyfile\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html"}], "related_resources": [{"scheme": "package", "title": "NetworkManager"}, {"scheme": "file", "title": "/etc/sysconfig/network-scripts/ifcfg-eth0"}], "remediations": [{"context": "Convert the configuration into NetworkManager native \"keyfile\" format.", "type": "hint"}, {"context": ["nmcli", "connection", "migrate", "/etc/sysconfig/network-scripts/ifcfg-eth0"], "type": "command"}]}, "groups": ["network", "services", "inhibitor"], "hostname": "managed-node01", "id": "8d24099edf934f8c13ba6f4b320a6e7470fbe27711ac601bccd4c93821d06957", "key": "7de70b43c3c9d20075e30894ac24a4c4e2d70837", "severity": "high", "summary": "Network configuration files in legacy \"ifcfg\" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:\n - /etc/sysconfig/network-scripts/ifcfg-eth0", "timeStamp": "2026-02-17T12:33:42.376946Z", "title": "Legacy network configuration found"}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "944d673b326aa5baa992688de37be05f32fd0bad586d60e705e93b0488ab5a18", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n", "timeStamp": "2026-02-17T12:33:42.863531Z", "title": "Use of NFS detected. Upgrade can't proceed"}, {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "78f1f2614f28e677d59d9c1f3c23c01817ce69040534a38311102c4743c73840", "key": "48e04852631245aa4afee9adcdc7c2375b8cffb8", "severity": "high", "summary": "Support for the following RHEL 9 device drivers has been removed in RHEL 10:\n - qla3xxx\n - vmw_pvrdma\n", "timeStamp": "2026-02-17T12:33:43.652561Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed."}], "upgrade_inhibited": true}, "ansible_loop_var": "item", "changed": false, "item": {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "78f1f2614f28e677d59d9c1f3c23c01817ce69040534a38311102c4743c73840", "key": "48e04852631245aa4afee9adcdc7c2375b8cffb8", "severity": "high", "summary": "Support for the following RHEL 9 device drivers has been removed in RHEL 10:\n - qla3xxx\n - vmw_pvrdma\n", "timeStamp": "2026-02-17T12:33:43.652561Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed."}} skipping: [managed-node01] => (item={'audience': 'sysadmin', 'groups': ['kernel', 'boot'], 'key': '9dde4bcd8b458bd6803462216785df3a1476c1f8', 'severity': 'high', 'summary': 'The following processors are no longer maintained in RHEL 10:\n - HASWELL_X\n', 'title': 'Leapp detected a processor which is no longer maintained in RHEL 10.', 'timeStamp': '2026-02-17T12:33:43.654297Z', 'hostname': 'managed-node01', 'actor': 'check_detected_devices_and_drivers', 'id': 'e440c0ac7483a1ef5e9717987d20b19f975521ddfac31c98c404986a0488688e'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "groups": ["kernel", "boot"], "hostname": "managed-node01", "id": "e440c0ac7483a1ef5e9717987d20b19f975521ddfac31c98c404986a0488688e", "key": "9dde4bcd8b458bd6803462216785df3a1476c1f8", "severity": "high", "summary": "The following processors are no longer maintained in RHEL 10:\n - HASWELL_X\n", "timeStamp": "2026-02-17T12:33:43.654297Z", "title": "Leapp detected a processor which is no longer maintained in RHEL 10."}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'audience': 'sysadmin', 'groups': ['boot'], 'key': 'ac7030e05d2ee248d34f08a9fa040b352bc410a3', 'severity': 'high', 'summary': 'On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running "grub2-install" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.', 'title': 'GRUB2 core will be automatically updated during the upgrade', 'timeStamp': '2026-02-17T12:33:44.024936Z', 'hostname': 'managed-node01', 'actor': 'check_grub_core', 'id': 'c164f8fa9e015e071db480a12850fcbdbae06384a56cb1a05310257a6bbe5900'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_grub_core", "audience": "sysadmin", "groups": ["boot"], "hostname": "managed-node01", "id": "c164f8fa9e015e071db480a12850fcbdbae06384a56cb1a05310257a6bbe5900", "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", "severity": "high", "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", "timeStamp": "2026-02-17T12:33:44.024936Z", "title": "GRUB2 core will be automatically updated during the upgrade"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'audience': 'sysadmin', 'groups': ['upgrade process', 'sanity'], 'key': '9e5088e3c1f371e020ec777c3d86578f4be143cf', 'severity': 'high', 'summary': 'Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.\n', 'title': 'Upgrade is unsupported', 'timeStamp': '2026-02-17T12:33:44.288932Z', 'hostname': 'managed-node01', 'actor': 'unsupported_upgrade_check', 'id': '99b2b0c03a1bcc516c3f254e8a97c7c2dc9c68ca6a3e90827989816ee49f34e8'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "unsupported_upgrade_check", "audience": "sysadmin", "groups": ["upgrade process", "sanity"], "hostname": "managed-node01", "id": "99b2b0c03a1bcc516c3f254e8a97c7c2dc9c68ca6a3e90827989816ee49f34e8", "key": "9e5088e3c1f371e020ec777c3d86578f4be143cf", "severity": "high", "summary": "Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.\n", "timeStamp": "2026-02-17T12:33:44.288932Z", "title": "Upgrade is unsupported"}, "skip_reason": "Conditional result was False"} ok: [managed-node01] => (item={'audience': 'sysadmin', 'detail': {'external': [{'title': 'Leapp upgrade failed with error "Inhibitor: Use of CIFS detected. Upgrade cannot proceed"', 'url': 'https://access.redhat.com/solutions/6964304'}], 'related_resources': [{'scheme': 'file', 'title': '/etc/fstab'}], 'remediations': [{'context': 'Comment out CIFS entries to proceed with the upgrade.', 'type': 'hint'}]}, 'groups': ['filesystem', 'network', 'inhibitor'], 'key': 'd0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a', 'severity': 'high', 'summary': 'CIFS is currently not supported by the inplace upgrade.', 'title': "Use of CIFS detected. Upgrade can't proceed", 'timeStamp': '2026-02-17T12:33:44.441567Z', 'hostname': 'managed-node01', 'actor': 'check_cifs', 'id': 'a311d7cee406a67bb670b566e01f0353d15638c58c1a83e5f5041de4bc0c7bbc'}) => {"ansible_facts": {"leapp_inhibitors": [{"actor": "network_deprecations", "audience": "sysadmin", "detail": {"external": [{"title": "How to migrate the connection from ifcfg to NetworkManager keyfile plugin?", "url": "https://access.redhat.com/solutions/7083803"}, {"title": "nmcli(1) manual, describes \"connection migrate\" sub-command.", "url": "https://networkmanager.dev/docs/api/latest/nmcli.html"}, {"title": "nm-settings-ifcfg-rh(5), description of the \"ifcfg\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html"}, {"title": "nm-settings-keyfile(5), description of the \"keyfile\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html"}], "related_resources": [{"scheme": "package", "title": "NetworkManager"}, {"scheme": "file", "title": "/etc/sysconfig/network-scripts/ifcfg-eth0"}], "remediations": [{"context": "Convert the configuration into NetworkManager native \"keyfile\" format.", "type": "hint"}, {"context": ["nmcli", "connection", "migrate", "/etc/sysconfig/network-scripts/ifcfg-eth0"], "type": "command"}]}, "groups": ["network", "services", "inhibitor"], "hostname": "managed-node01", "id": "8d24099edf934f8c13ba6f4b320a6e7470fbe27711ac601bccd4c93821d06957", "key": "7de70b43c3c9d20075e30894ac24a4c4e2d70837", "severity": "high", "summary": "Network configuration files in legacy \"ifcfg\" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:\n - /etc/sysconfig/network-scripts/ifcfg-eth0", "timeStamp": "2026-02-17T12:33:42.376946Z", "title": "Legacy network configuration found"}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "944d673b326aa5baa992688de37be05f32fd0bad586d60e705e93b0488ab5a18", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n", "timeStamp": "2026-02-17T12:33:42.863531Z", "title": "Use of NFS detected. Upgrade can't proceed"}, {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "78f1f2614f28e677d59d9c1f3c23c01817ce69040534a38311102c4743c73840", "key": "48e04852631245aa4afee9adcdc7c2375b8cffb8", "severity": "high", "summary": "Support for the following RHEL 9 device drivers has been removed in RHEL 10:\n - qla3xxx\n - vmw_pvrdma\n", "timeStamp": "2026-02-17T12:33:43.652561Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed."}, {"actor": "check_cifs", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "a311d7cee406a67bb670b566e01f0353d15638c58c1a83e5f5041de4bc0c7bbc", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2026-02-17T12:33:44.441567Z", "title": "Use of CIFS detected. Upgrade can't proceed"}], "upgrade_inhibited": true}, "ansible_loop_var": "item", "changed": false, "item": {"actor": "check_cifs", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "a311d7cee406a67bb670b566e01f0353d15638c58c1a83e5f5041de4bc0c7bbc", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2026-02-17T12:33:44.441567Z", "title": "Use of CIFS detected. Upgrade can't proceed"}} TASK [infra.leapp.common : parse_leapp_report | Collect inhibitors] ************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:51 ok: [managed-node01] => {"changed": false, "cmd": ["awk", "/\\(inhibitor\\)/,/^-------/", "/var/log/leapp/leapp-report.txt"], "delta": "0:00:00.004665", "end": "2026-02-17 07:34:21.288532", "failed_when_result": false, "msg": "", "rc": 0, "start": "2026-02-17 07:34:21.283867", "stderr": "", "stderr_lines": [], "stdout": "Risk Factor: high (inhibitor)\nTitle: Legacy network configuration found\nSummary: Network configuration files in legacy \"ifcfg\" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:\n - /etc/sysconfig/network-scripts/ifcfg-eth0\nRelated links:\n - How to migrate the connection from ifcfg to NetworkManager keyfile plugin?: https://access.redhat.com/solutions/7083803\n - nmcli(1) manual, describes \"connection migrate\" sub-command.: https://networkmanager.dev/docs/api/latest/nmcli.html\n - nm-settings-ifcfg-rh(5), description of the \"ifcfg\" format: https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html\n - nm-settings-keyfile(5), description of the \"keyfile\" format: https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html\nRemediation: [hint] Convert the configuration into NetworkManager native \"keyfile\" format.\n[command] nmcli connection migrate /etc/sysconfig/network-scripts/ifcfg-eth0\nKey: 7de70b43c3c9d20075e30894ac24a4c4e2d70837\n----------------------------------------\nRisk Factor: high (inhibitor)\nTitle: Use of NFS detected. Upgrade can't proceed\nSummary: NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n\nRelated links:\n - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006\nRemediation: [hint] Disable NFS temporarily for the upgrade if possible.\nKey: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed\n----------------------------------------\nRisk Factor: high (inhibitor)\nTitle: Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\nSummary: Support for the following RHEL 9 device drivers has been removed in RHEL 10:\n - qla3xxx\n - vmw_pvrdma\n\nRelated links:\n - Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\": https://access.redhat.com/solutions/6971716\n - Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\": https://access.redhat.com/solutions/5436131\nKey: 48e04852631245aa4afee9adcdc7c2375b8cffb8\n----------------------------------------\nRisk Factor: high (inhibitor)\nTitle: Use of CIFS detected. Upgrade can't proceed\nSummary: CIFS is currently not supported by the inplace upgrade.\nRelated links:\n - Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\": https://access.redhat.com/solutions/6964304\nRemediation: [hint] Comment out CIFS entries to proceed with the upgrade.\nKey: d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a\n----------------------------------------", "stdout_lines": ["Risk Factor: high (inhibitor)", "Title: Legacy network configuration found", "Summary: Network configuration files in legacy \"ifcfg\" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:", " - /etc/sysconfig/network-scripts/ifcfg-eth0", "Related links:", " - How to migrate the connection from ifcfg to NetworkManager keyfile plugin?: https://access.redhat.com/solutions/7083803", " - nmcli(1) manual, describes \"connection migrate\" sub-command.: https://networkmanager.dev/docs/api/latest/nmcli.html", " - nm-settings-ifcfg-rh(5), description of the \"ifcfg\" format: https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html", " - nm-settings-keyfile(5), description of the \"keyfile\" format: https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html", "Remediation: [hint] Convert the configuration into NetworkManager native \"keyfile\" format.", "[command] nmcli connection migrate /etc/sysconfig/network-scripts/ifcfg-eth0", "Key: 7de70b43c3c9d20075e30894ac24a4c4e2d70837", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Use of NFS detected. Upgrade can't proceed", "Summary: NFS is currently not supported by the inplace upgrade.", "We have found NFS usage at the following locations:", "- NFS shares found in /etc/fstab:", " - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat", " - nest.test.redhat.com:/mnt/qa /mnt/qa", " - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive", " - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist", " - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew", " - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch", "", "Related links:", " - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006", "Remediation: [hint] Disable NFS temporarily for the upgrade if possible.", "Key: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.", "Summary: Support for the following RHEL 9 device drivers has been removed in RHEL 10:", " - qla3xxx", " - vmw_pvrdma", "", "Related links:", " - Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\": https://access.redhat.com/solutions/6971716", " - Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\": https://access.redhat.com/solutions/5436131", "Key: 48e04852631245aa4afee9adcdc7c2375b8cffb8", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Use of CIFS detected. Upgrade can't proceed", "Summary: CIFS is currently not supported by the inplace upgrade.", "Related links:", " - Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\": https://access.redhat.com/solutions/6964304", "Remediation: [hint] Comment out CIFS entries to proceed with the upgrade.", "Key: d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "----------------------------------------"]} TASK [infra.leapp.common : parse_leapp_report | Collect high errors] *********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:60 ok: [managed-node01] => {"changed": false, "cmd": ["awk", "/high \\(error\\)/,/^-------/", "/var/log/leapp/leapp-report.txt"], "delta": "0:00:00.004051", "end": "2026-02-17 07:34:21.658446", "failed_when_result": false, "msg": "", "rc": 0, "start": "2026-02-17 07:34:21.654395", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} TASK [infra.leapp.analysis : analysis-leapp | Copy reports to the controller] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:115 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/copy_reports_to_controller.yml for managed-node01 TASK [infra.leapp.analysis : copy_reports_to_controller | Ensure reports directory on controller] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/copy_reports_to_controller.yml:10 changed: [managed-node01 -> localhost] => {"changed": true, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/leapp_reports_2026-02-17_12-34-21", "secontext": "unconfined_u:object_r:admin_home_t:s0", "size": 6, "state": "directory", "uid": 0} TASK [infra.leapp.analysis : copy_reports_to_controller | Copy report files to the controller] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/copy_reports_to_controller.yml:18 changed: [managed-node01] => (item={'src': '/var/log/leapp/leapp-report.json', 'ext': 'json'}) => {"ansible_loop_var": "item", "changed": true, "checksum": "fe4056ce5cd9467367a8f8c98a13d533fe284069", "dest": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/leapp_reports_2026-02-17_12-34-22/leapp-report.managed-node01.json/managed-node01/var/log/leapp/leapp-report.json", "item": {"ext": "json", "src": "/var/log/leapp/leapp-report.json"}, "md5sum": "d0e70775364ccc4a130a361884a458f7", "remote_checksum": "fe4056ce5cd9467367a8f8c98a13d533fe284069", "remote_md5sum": null} changed: [managed-node01] => (item={'src': '/var/log/leapp/leapp-report.txt', 'ext': 'txt'}) => {"ansible_loop_var": "item", "changed": true, "checksum": "6dce581c8141552a32a99a9d848375d84a6b2745", "dest": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/leapp_reports_2026-02-17_12-34-22/leapp-report.managed-node01.txt/managed-node01/var/log/leapp/leapp-report.txt", "item": {"ext": "txt", "src": "/var/log/leapp/leapp-report.txt"}, "md5sum": "c87d4049e24429ed0929ce883d33fd5b", "remote_checksum": "6dce581c8141552a32a99a9d848375d84a6b2745", "remote_md5sum": null} TASK [infra.leapp.analysis : analysis-leapp | Create remediation hostvars] ***** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:119 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/create_remediation_hostvars.yml for managed-node01 TASK [infra.leapp.analysis : create_remediation_hostvars | Clear remediation_todo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/create_remediation_hostvars.yml:2 ok: [managed-node01] => {"ansible_facts": {"leapp_remediation_todo": []}, "changed": false} TASK [infra.leapp.analysis : create_remediation_hostvars | Map inhibitors to remediation_todo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/create_remediation_hostvars.yml:6 ok: [managed-node01] => (item="7de70b43c3c9d20075e30894ac24a4c4e2d70837" [found], "Legacy network configuration found" [found] -> leapp_legacy_network_configuration) => {"ansible_facts": {"leapp_remediation_todo": ["leapp_legacy_network_configuration"]}, "ansible_loop_var": "inhibitor", "changed": false, "inhibitor": {"actor": "network_deprecations", "audience": "sysadmin", "detail": {"external": [{"title": "How to migrate the connection from ifcfg to NetworkManager keyfile plugin?", "url": "https://access.redhat.com/solutions/7083803"}, {"title": "nmcli(1) manual, describes \"connection migrate\" sub-command.", "url": "https://networkmanager.dev/docs/api/latest/nmcli.html"}, {"title": "nm-settings-ifcfg-rh(5), description of the \"ifcfg\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html"}, {"title": "nm-settings-keyfile(5), description of the \"keyfile\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html"}], "related_resources": [{"scheme": "package", "title": "NetworkManager"}, {"scheme": "file", "title": "/etc/sysconfig/network-scripts/ifcfg-eth0"}], "remediations": [{"context": "Convert the configuration into NetworkManager native \"keyfile\" format.", "type": "hint"}, {"context": ["nmcli", "connection", "migrate", "/etc/sysconfig/network-scripts/ifcfg-eth0"], "type": "command"}]}, "groups": ["network", "services", "inhibitor"], "hostname": "managed-node01", "id": "8d24099edf934f8c13ba6f4b320a6e7470fbe27711ac601bccd4c93821d06957", "key": "7de70b43c3c9d20075e30894ac24a4c4e2d70837", "severity": "high", "summary": "Network configuration files in legacy \"ifcfg\" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:\n - /etc/sysconfig/network-scripts/ifcfg-eth0", "timeStamp": "2026-02-17T12:33:42.376946Z", "title": "Legacy network configuration found"}} ok: [managed-node01] => (item="9881b25faceeeaa7a6478bcdac29afd7f6baaaed" [found], "Use of NFS detected. Upgrade can't proceed" [found] -> leapp_nfs_detected) => {"ansible_facts": {"leapp_remediation_todo": ["leapp_legacy_network_configuration", "leapp_nfs_detected"]}, "ansible_loop_var": "inhibitor", "changed": false, "inhibitor": {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "944d673b326aa5baa992688de37be05f32fd0bad586d60e705e93b0488ab5a18", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n", "timeStamp": "2026-02-17T12:33:42.863531Z", "title": "Use of NFS detected. Upgrade can't proceed"}} ok: [managed-node01] => (item="48e04852631245aa4afee9adcdc7c2375b8cffb8" [found], "Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed." [found] -> leapp_loaded_removed_kernel_drivers) => {"ansible_facts": {"leapp_remediation_todo": ["leapp_legacy_network_configuration", "leapp_nfs_detected", "leapp_loaded_removed_kernel_drivers"]}, "ansible_loop_var": "inhibitor", "changed": false, "inhibitor": {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "78f1f2614f28e677d59d9c1f3c23c01817ce69040534a38311102c4743c73840", "key": "48e04852631245aa4afee9adcdc7c2375b8cffb8", "severity": "high", "summary": "Support for the following RHEL 9 device drivers has been removed in RHEL 10:\n - qla3xxx\n - vmw_pvrdma\n", "timeStamp": "2026-02-17T12:33:43.652561Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed."}} ok: [managed-node01] => (item="d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a" [found], "Use of CIFS detected. Upgrade can't proceed" [found] -> leapp_cifs_detected) => {"ansible_facts": {"leapp_remediation_todo": ["leapp_legacy_network_configuration", "leapp_nfs_detected", "leapp_loaded_removed_kernel_drivers", "leapp_cifs_detected"]}, "ansible_loop_var": "inhibitor", "changed": false, "inhibitor": {"actor": "check_cifs", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "a311d7cee406a67bb670b566e01f0353d15638c58c1a83e5f5041de4bc0c7bbc", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2026-02-17T12:33:44.441567Z", "title": "Use of CIFS detected. Upgrade can't proceed"}} TASK [infra.leapp.analysis : create_remediation_hostvars | Ensure host_vars directory exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/create_remediation_hostvars.yml:29 changed: [managed-node01 -> localhost] => {"changed": true, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/host_vars", "secontext": "unconfined_u:object_r:admin_home_t:s0", "size": 6, "state": "directory", "uid": 0} TASK [infra.leapp.analysis : create_remediation_hostvars | Check if host_vars file exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/create_remediation_hostvars.yml:37 ok: [managed-node01 -> localhost] => {"changed": false, "stat": {"exists": false}} TASK [infra.leapp.analysis : create_remediation_hostvars | Read existing host_vars file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/create_remediation_hostvars.yml:43 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : create_remediation_hostvars | Write host_vars file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/create_remediation_hostvars.yml:50 changed: [managed-node01 -> localhost] => {"changed": true, "checksum": "8465e41bcfa05943d4399d3497b36e1527f3982b", "dest": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/host_vars/managed-node01.yml", "gid": 0, "group": "root", "md5sum": "62cd883ad20225381024ad340a7f0c85", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:admin_home_t:s0", "size": 146, "src": "/root/.ansible/tmp/ansible-tmp-1771331663.520986-10464-187661900779172/source", "state": "file", "uid": 0} TASK [infra.leapp.analysis : create_remediation_hostvars | Create remediation playbook file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/create_remediation_hostvars.yml:67 changed: [managed-node01 -> localhost] => {"changed": true, "checksum": "078e4b5f81d092599c4c3765af8eae9ad8c501b3", "dest": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/remediate.yml", "gid": 0, "group": "root", "md5sum": "d099bababf24590e9e539eadf7bfcf96", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:admin_home_t:s0", "size": 178, "src": "/root/.ansible/tmp/ansible-tmp-1771331663.9132519-10489-3037253894112/source", "state": "file", "uid": 0} TASK [infra.leapp.analysis : create_remediation_hostvars | Remove remediation host_vars if no inhibitors] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/create_remediation_hostvars.yml:83 skipping: [managed-node01] => (item=/root/.ansible/collections/ansible_collections/infra/leapp/tests/host_vars/managed-node01.yml) => {"ansible_loop_var": "item", "changed": false, "item": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/host_vars/managed-node01.yml", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item=/root/.ansible/collections/ansible_collections/infra/leapp/tests/remediate.yml) => {"ansible_loop_var": "item", "changed": false, "item": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/remediate.yml", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => {"changed": false, "msg": "All items skipped"} TASK [infra.leapp.analysis : Set stats for leapp_inhibitors] ******************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:17 ok: [managed-node01] => {"ansible_stats": {"aggregate": true, "data": {"leapp_inhibitors": [{"actor": "network_deprecations", "audience": "sysadmin", "detail": {"external": [{"title": "How to migrate the connection from ifcfg to NetworkManager keyfile plugin?", "url": "https://access.redhat.com/solutions/7083803"}, {"title": "nmcli(1) manual, describes \"connection migrate\" sub-command.", "url": "https://networkmanager.dev/docs/api/latest/nmcli.html"}, {"title": "nm-settings-ifcfg-rh(5), description of the \"ifcfg\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html"}, {"title": "nm-settings-keyfile(5), description of the \"keyfile\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html"}], "related_resources": [{"scheme": "package", "title": "NetworkManager"}, {"scheme": "file", "title": "/etc/sysconfig/network-scripts/ifcfg-eth0"}], "remediations": [{"context": "Convert the configuration into NetworkManager native \"keyfile\" format.", "type": "hint"}, {"context": ["nmcli", "connection", "migrate", "/etc/sysconfig/network-scripts/ifcfg-eth0"], "type": "command"}]}, "groups": ["network", "services", "inhibitor"], "hostname": "managed-node01", "id": "8d24099edf934f8c13ba6f4b320a6e7470fbe27711ac601bccd4c93821d06957", "key": "7de70b43c3c9d20075e30894ac24a4c4e2d70837", "severity": "high", "summary": "Network configuration files in legacy \"ifcfg\" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:\n - /etc/sysconfig/network-scripts/ifcfg-eth0", "timeStamp": "2026-02-17T12:33:42.376946Z", "title": "Legacy network configuration found"}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "944d673b326aa5baa992688de37be05f32fd0bad586d60e705e93b0488ab5a18", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n", "timeStamp": "2026-02-17T12:33:42.863531Z", "title": "Use of NFS detected. Upgrade can't proceed"}, {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "78f1f2614f28e677d59d9c1f3c23c01817ce69040534a38311102c4743c73840", "key": "48e04852631245aa4afee9adcdc7c2375b8cffb8", "severity": "high", "summary": "Support for the following RHEL 9 device drivers has been removed in RHEL 10:\n - qla3xxx\n - vmw_pvrdma\n", "timeStamp": "2026-02-17T12:33:43.652561Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed."}, {"actor": "check_cifs", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "a311d7cee406a67bb670b566e01f0353d15638c58c1a83e5f5041de4bc0c7bbc", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2026-02-17T12:33:44.441567Z", "title": "Use of CIFS detected. Upgrade can't proceed"}]}, "per_host": false}, "changed": false} TASK [infra.leapp.analysis : Notify analysis report is done handler] *********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:22 NOTIFIED HANDLER infra.leapp.analysis : Preupgrade analysis report is done for managed-node01 NOTIFIED HANDLER infra.leapp.analysis : Display inhibitors for managed-node01 NOTIFIED HANDLER infra.leapp.analysis : Display errors for managed-node01 changed: [managed-node01] => {"changed": true, "msg": "All assertions passed"} TASK [common_upgrade_tasks | Flush handlers] *********************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:44 META: triggered running handlers for managed-node01 RUNNING HANDLER [infra.leapp.common : Check for log file] ********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:3 ok: [managed-node01] => {"changed": false, "stat": {"atime": 1771331589.198078, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 32, "charset": "us-ascii", "checksum": "3232765311fbc57105ddf9e5bef2d0783ee41c00", "ctime": 1771331624.9619546, "dev": 51716, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 603979912, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1771331624.9619546, "nlink": 1, "path": "/var/log/ripu/ripu.log", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 14218, "uid": 0, "version": "3831328116", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} RUNNING HANDLER [infra.leapp.common : Add end time to log file] **************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:9 changed: [managed-node01] => {"backup": "", "changed": true, "msg": "line added"} RUNNING HANDLER [infra.leapp.common : Slurp ripu.log file] ********************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:19 ok: [managed-node01] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} RUNNING HANDLER [infra.leapp.common : Decode ripu.log file] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:27 ok: [managed-node01] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} RUNNING HANDLER [infra.leapp.common : Rename log file] ************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:34 changed: [managed-node01] => {"changed": true, "cmd": "export PATH=$PATH\nmv /var/log/ripu/ripu.log /var/log/ripu/ripu.log-20260217T073301\n", "delta": "0:00:00.004072", "end": "2026-02-17 07:34:25.945027", "msg": "", "rc": 0, "start": "2026-02-17 07:34:25.940955", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} RUNNING HANDLER [infra.leapp.common : Check for log file] ********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:3 ok: [managed-node01] => {"changed": false, "stat": {"exists": false}} RUNNING HANDLER [infra.leapp.common : Add end time to log file] **************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:9 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Slurp ripu.log file] ********************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:19 skipping: [managed-node01] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} RUNNING HANDLER [infra.leapp.common : Decode ripu.log file] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:27 skipping: [managed-node01] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} RUNNING HANDLER [infra.leapp.common : Rename log file] ************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:34 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.analysis : Display inhibitors] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/handlers/main.yml:10 ok: [managed-node01] => { "results_inhibitors.stdout_lines": [ "Risk Factor: high (inhibitor)", "Title: Legacy network configuration found", "Summary: Network configuration files in legacy \"ifcfg\" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:", " - /etc/sysconfig/network-scripts/ifcfg-eth0", "Related links:", " - How to migrate the connection from ifcfg to NetworkManager keyfile plugin?: https://access.redhat.com/solutions/7083803", " - nmcli(1) manual, describes \"connection migrate\" sub-command.: https://networkmanager.dev/docs/api/latest/nmcli.html", " - nm-settings-ifcfg-rh(5), description of the \"ifcfg\" format: https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html", " - nm-settings-keyfile(5), description of the \"keyfile\" format: https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html", "Remediation: [hint] Convert the configuration into NetworkManager native \"keyfile\" format.", "[command] nmcli connection migrate /etc/sysconfig/network-scripts/ifcfg-eth0", "Key: 7de70b43c3c9d20075e30894ac24a4c4e2d70837", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Use of NFS detected. Upgrade can't proceed", "Summary: NFS is currently not supported by the inplace upgrade.", "We have found NFS usage at the following locations:", "- NFS shares found in /etc/fstab:", " - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat", " - nest.test.redhat.com:/mnt/qa /mnt/qa", " - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive", " - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist", " - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew", " - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch", "", "Related links:", " - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006", "Remediation: [hint] Disable NFS temporarily for the upgrade if possible.", "Key: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.", "Summary: Support for the following RHEL 9 device drivers has been removed in RHEL 10:", " - qla3xxx", " - vmw_pvrdma", "", "Related links:", " - Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\": https://access.redhat.com/solutions/6971716", " - Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\": https://access.redhat.com/solutions/5436131", "Key: 48e04852631245aa4afee9adcdc7c2375b8cffb8", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Use of CIFS detected. Upgrade can't proceed", "Summary: CIFS is currently not supported by the inplace upgrade.", "Related links:", " - Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\": https://access.redhat.com/solutions/6964304", "Remediation: [hint] Comment out CIFS entries to proceed with the upgrade.", "Key: d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "----------------------------------------" ] } RUNNING HANDLER [infra.leapp.analysis : Display errors] ************************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/handlers/main.yml:18 skipping: [managed-node01] => {} RUNNING HANDLER [infra.leapp.analysis : Preupgrade analysis report is done] **** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/handlers/main.yml:26 ok: [managed-node01] => { "msg": "The preupgrade analysis report generation is now complete. WARNING: Inhibitors found. Review the tasks above or the result file at /var/log/leapp/leapp-report.txt." } TASK [common_upgrade_tasks | Show all inhibitors collected by analysis] ******** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:47 ok: [managed-node01] => { "leapp_inhibitors | default([])": [ { "actor": "network_deprecations", "audience": "sysadmin", "detail": { "external": [ { "title": "How to migrate the connection from ifcfg to NetworkManager keyfile plugin?", "url": "https://access.redhat.com/solutions/7083803" }, { "title": "nmcli(1) manual, describes \"connection migrate\" sub-command.", "url": "https://networkmanager.dev/docs/api/latest/nmcli.html" }, { "title": "nm-settings-ifcfg-rh(5), description of the \"ifcfg\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html" }, { "title": "nm-settings-keyfile(5), description of the \"keyfile\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html" } ], "related_resources": [ { "scheme": "package", "title": "NetworkManager" }, { "scheme": "file", "title": "/etc/sysconfig/network-scripts/ifcfg-eth0" } ], "remediations": [ { "context": "Convert the configuration into NetworkManager native \"keyfile\" format.", "type": "hint" }, { "context": [ "nmcli", "connection", "migrate", "/etc/sysconfig/network-scripts/ifcfg-eth0" ], "type": "command" } ] }, "groups": [ "network", "services", "inhibitor" ], "hostname": "managed-node01", "id": "8d24099edf934f8c13ba6f4b320a6e7470fbe27711ac601bccd4c93821d06957", "key": "7de70b43c3c9d20075e30894ac24a4c4e2d70837", "severity": "high", "summary": "Network configuration files in legacy \"ifcfg\" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:\n - /etc/sysconfig/network-scripts/ifcfg-eth0", "timeStamp": "2026-02-17T12:33:42.376946Z", "title": "Legacy network configuration found" }, { "actor": "check_nfs", "audience": "sysadmin", "detail": { "external": [ { "title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006" } ], "related_resources": [ { "scheme": "file", "title": "/etc/fstab" } ], "remediations": [ { "context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint" } ] }, "groups": [ "filesystem", "network", "inhibitor" ], "hostname": "managed-node01", "id": "944d673b326aa5baa992688de37be05f32fd0bad586d60e705e93b0488ab5a18", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n", "timeStamp": "2026-02-17T12:33:42.863531Z", "title": "Use of NFS detected. Upgrade can't proceed" }, { "actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": { "external": [ { "title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/6971716" }, { "title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131" } ] }, "groups": [ "kernel", "drivers", "inhibitor" ], "hostname": "managed-node01", "id": "78f1f2614f28e677d59d9c1f3c23c01817ce69040534a38311102c4743c73840", "key": "48e04852631245aa4afee9adcdc7c2375b8cffb8", "severity": "high", "summary": "Support for the following RHEL 9 device drivers has been removed in RHEL 10:\n - qla3xxx\n - vmw_pvrdma\n", "timeStamp": "2026-02-17T12:33:43.652561Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed." }, { "actor": "check_cifs", "audience": "sysadmin", "detail": { "external": [ { "title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304" } ], "related_resources": [ { "scheme": "file", "title": "/etc/fstab" } ], "remediations": [ { "context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint" } ] }, "groups": [ "filesystem", "network", "inhibitor" ], "hostname": "managed-node01", "id": "a311d7cee406a67bb670b566e01f0353d15638c58c1a83e5f5041de4bc0c7bbc", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2026-02-17T12:33:44.441567Z", "title": "Use of CIFS detected. Upgrade can't proceed" } ] } TASK [common_upgrade_tasks | Debug remediation_todo] *************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:51 ok: [managed-node01] => { "leapp_remediation_todo": [ "leapp_legacy_network_configuration", "leapp_nfs_detected", "leapp_loaded_removed_kernel_drivers", "leapp_cifs_detected" ] } TASK [common_upgrade_tasks | Assert remediate hostvars and playbook exist] ***** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:58 failed: [managed-node01 -> localhost] (item=/root/.ansible/collections/ansible_collections/infra/leapp/tests/host_vars/managed-node01.yml) => {"ansible_loop_var": "item", "changed": false, "failed_when_result": true, "item": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/host_vars/managed-node01.yml", "stat": {"atime": 1771331663.85228, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "8465e41bcfa05943d4399d3497b36e1527f3982b", "ctime": 1771331663.85528, "dev": 51716, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 771752113, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1771331663.6882787, "nlink": 1, "path": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/host_vars/managed-node01.yml", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 146, "uid": 0, "version": "889695705", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} failed: [managed-node01 -> localhost] (item=/root/.ansible/collections/ansible_collections/infra/leapp/tests/remediate.yml) => {"ansible_loop_var": "item", "changed": false, "failed_when_result": true, "item": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/remediate.yml", "stat": {"atime": 1771331664.271283, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "078e4b5f81d092599c4c3765af8eae9ad8c501b3", "ctime": 1771331664.274283, "dev": 51716, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 796917923, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1771331664.1112819, "nlink": 1, "path": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/remediate.yml", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 178, "uid": 0, "version": "581088873", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} TASK [tests_upgrade_custom | Cleanup | Remove log files] *********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/tests_upgrade_custom.yml:49 changed: [managed-node01] => {"changed": true, "cmd": "set -euxo pipefail\nrm -f /var/log/leapp/leapp-upgrade.log\nrm -f /var/log/ripu/ripu.log*\n", "delta": "0:00:00.005033", "end": "2026-02-17 07:34:27.699739", "msg": "", "rc": 0, "start": "2026-02-17 07:34:27.694706", "stderr": "+ rm -f /var/log/leapp/leapp-upgrade.log\n+ rm -f /var/log/ripu/ripu.log-20260217T073301", "stderr_lines": ["+ rm -f /var/log/leapp/leapp-upgrade.log", "+ rm -f /var/log/ripu/ripu.log-20260217T073301"], "stdout": "", "stdout_lines": []} PLAY RECAP ********************************************************************* managed-node01 : ok=66 changed=19 unreachable=0 failed=1 skipped=28 rescued=0 ignored=0 Feb 17 07:33:01 managed-node01 python3[9692]: ansible-ansible.legacy.setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Feb 17 07:33:02 managed-node01 python3[9870]: ansible-ansible.builtin.stat Invoked with path=/var/log/leapp/leapp-upgrade.log follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 17 07:33:03 managed-node01 python3[10019]: ansible-ansible.legacy.dnf Invoked with name=['leapp-upgrade'] state=absent allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 17 07:33:05 managed-node01 python3[10169]: ansible-ansible.builtin.lineinfile Invoked with path=/etc/fstab line=//127.0.0.1/test_remediate_cifs /mnt/cifs cifs username=test,password=test 0 0 state=present backrefs=False create=False backup=False firstmatch=False unsafe_writes=False regexp=None search_string=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 17 07:33:06 managed-node01 python3[10318]: ansible-infra.leapp.modprobe Invoked with name=qla3xxx state=present params= persistent=disabled Feb 17 07:33:06 managed-node01 kernel: Warning: Unmaintained driver is detected: qla3xxx Feb 17 07:33:06 managed-node01 kernel: Warning: Unmaintained driver is detected: ql3xxx_driver_init Feb 17 07:33:06 managed-node01 python3[10470]: ansible-infra.leapp.modprobe Invoked with name=vmw_pvrdma state=present params= persistent=disabled Feb 17 07:33:06 managed-node01 kernel: Warning: Unmaintained driver is detected: vmw_pvrdma Feb 17 07:33:06 managed-node01 kernel: Warning: Unmaintained driver is detected: pvrdma_init Feb 17 07:33:07 managed-node01 python3[10627]: ansible-ansible.builtin.file Invoked with path=/var/log/ripu state=directory owner=root group=root mode=0755 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 17 07:33:08 managed-node01 python3[10776]: ansible-ansible.builtin.stat Invoked with path=/var/log/ripu/ripu.log follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 17 07:33:08 managed-node01 python3[10925]: ansible-ansible.legacy.stat Invoked with path=/var/log/ripu/ripu.log follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 17 07:33:09 managed-node01 python3[11045]: ansible-ansible.legacy.copy Invoked with dest=/var/log/ripu/ripu.log owner=root group=root mode=0644 src=/root/.ansible/tmp/ansible-tmp-1771331588.4467087-9604-120481524519547/source _original_basename=tmp4d6dhrbr follow=False checksum=2e41ec137fcd95caf8e96bfc9b19e48e7ced8a6d backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Feb 17 07:33:09 managed-node01 python3[11194]: ansible-ansible.builtin.file Invoked with path=/etc/ansible/facts.d state=directory mode=0755 owner=root group=root recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 17 07:33:10 managed-node01 python3[11343]: ansible-ansible.legacy.stat Invoked with path=/etc/ansible/facts.d/pre_ripu.fact follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 17 07:33:10 managed-node01 python3[11465]: ansible-ansible.legacy.copy Invoked with dest=/etc/ansible/facts.d/pre_ripu.fact mode=0644 owner=root group=root src=/root/.ansible/tmp/ansible-tmp-1771331589.7646363-9730-72098367620653/source _original_basename=tmph81i3k5h follow=False checksum=b106720fdd239397dba5da37ef8d75b7fc2b1411 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Feb 17 07:33:10 managed-node01 python3[11614]: ansible-ansible.legacy.command Invoked with _raw_params=set -o pipefail; export PATH=$PATH; rpm -qa | grep -ve '[\.|+]el9' | grep -vE '^(gpg-pubkey|libmodulemd|katello-ca-consumer)' | sort _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 17 07:33:11 managed-node01 python3[11768]: ansible-ansible.legacy.stat Invoked with path=/etc/ansible/facts.d/non_rhel_packages.fact follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 17 07:33:11 managed-node01 python3[11843]: ansible-ansible.legacy.file Invoked with mode=0644 owner=root group=root dest=/etc/ansible/facts.d/non_rhel_packages.fact _original_basename=tmp7gt1sq93 recurse=False state=file path=/etc/ansible/facts.d/non_rhel_packages.fact force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 17 07:33:12 managed-node01 python3[11992]: ansible-ansible.legacy.dnf Invoked with name=['leapp-upgrade'] enablerepo=[] state=latest allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 17 07:33:15 managed-node01 python3[12145]: ansible-ansible.builtin.file Invoked with path=/var/log/leapp state=directory owner=root group=root mode=0700 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 17 07:33:15 managed-node01 python3[12294]: ansible-ansible.legacy.stat Invoked with path=/var/log/leapp/answerfile follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 17 07:33:16 managed-node01 python3[12416]: ansible-ansible.legacy.copy Invoked with dest=/var/log/leapp/answerfile owner=root group=root mode=0644 src=/root/.ansible/tmp/ansible-tmp-1771331595.5507636-9917-48722096681825/source _original_basename=tmpr_uhhizd follow=False checksum=3d934ad808576e3a7fb4c14a89645a4ad55ccf53 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Feb 17 07:33:16 managed-node01 python3[12565]: ansible-ansible.builtin.file Invoked with path=/etc/leapp/files/leapp_upgrade_repositories.repo state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 17 07:33:17 managed-node01 python3[12714]: ansible-ansible.builtin.yum_repository Invoked with name=rhel-10-for-x86_64-baseos-rpms description=BaseOS for x86_64 baseurl=['http://download.devel.redhat.com/rhel-10/nightly/updates/RHEL-10/latest-RHEL-10.1/compose/BaseOS/x86_64/os/'] enabled=True gpgcheck=False file=/etc/leapp/files/leapp_upgrade_repositories state=present owner=root group=root mode=0644 reposdir=/etc/yum.repos.d unsafe_writes=False bandwidth=None cost=None deltarpm_metadata_percentage=None deltarpm_percentage=None enablegroups=None exclude=None failovermethod=None gpgcakey=None gpgkey=None module_hotfixes=None http_caching=None include=None includepkgs=None ip_resolve=None keepalive=None keepcache=None metadata_expire=None metadata_expire_filter=None metalink=None mirrorlist=None mirrorlist_expire=None params=None password=NOT_LOGGING_PARAMETER priority=None protect=None proxy=None proxy_password=NOT_LOGGING_PARAMETER proxy_username=None repo_gpgcheck=None retries=None s3_enabled=None skip_if_unavailable=None sslcacert=None ssl_check_cert_permissions=None sslclientcert=None sslclientkey=None sslverify=None throttle=None timeout=None ui_repoid_vars=None username=None async=None seuser=None serole=None selevel=None setype=None attributes=None Feb 17 07:33:17 managed-node01 python3[12863]: ansible-ansible.builtin.yum_repository Invoked with name=rhel-10-for-x86_64-appstream-rpms description=AppStream for x86_64 baseurl=['http://download.devel.redhat.com/rhel-10/nightly/updates/RHEL-10/latest-RHEL-10.1/compose/AppStream/x86_64/os/'] enabled=True gpgcheck=False file=/etc/leapp/files/leapp_upgrade_repositories state=present owner=root group=root mode=0644 reposdir=/etc/yum.repos.d unsafe_writes=False bandwidth=None cost=None deltarpm_metadata_percentage=None deltarpm_percentage=None enablegroups=None exclude=None failovermethod=None gpgcakey=None gpgkey=None module_hotfixes=None http_caching=None include=None includepkgs=None ip_resolve=None keepalive=None keepcache=None metadata_expire=None metadata_expire_filter=None metalink=None mirrorlist=None mirrorlist_expire=None params=None password=NOT_LOGGING_PARAMETER priority=None protect=None proxy=None proxy_password=NOT_LOGGING_PARAMETER proxy_username=None repo_gpgcheck=None retries=None s3_enabled=None skip_if_unavailable=None sslcacert=None ssl_check_cert_permissions=None sslclientcert=None sslclientkey=None sslverify=None throttle=None timeout=None ui_repoid_vars=None username=None async=None seuser=None serole=None selevel=None setype=None attributes=None Feb 17 07:33:18 managed-node01 ansible-async_wrapper.py[13035]: Invoked with j35166807842 7200 /root/.ansible/tmp/ansible-tmp-1771331597.7607234-10025-33271717715500/AnsiballZ_command.py _ Feb 17 07:33:18 managed-node01 ansible-async_wrapper.py[13038]: Starting module and watcher Feb 17 07:33:18 managed-node01 ansible-async_wrapper.py[13038]: Start watching 13039 (7200) Feb 17 07:33:18 managed-node01 ansible-async_wrapper.py[13039]: Start module (13039) Feb 17 07:33:18 managed-node01 ansible-async_wrapper.py[13035]: Return async_wrapper task started. Feb 17 07:33:18 managed-node01 python3[13040]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=set -o pipefail; export PATH=$PATH; ulimit -n 16384; leapp preupgrade --report-schema=1.2.0 --no-rhsm 2>&1 | tee -a /var/log/ripu/ripu.log _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Feb 17 07:33:23 managed-node01 ansible-async_wrapper.py[13038]: 13039 still running (7200) Feb 17 07:33:28 managed-node01 ansible-async_wrapper.py[13038]: 13039 still running (7195) Feb 17 07:33:33 managed-node01 ansible-async_wrapper.py[13038]: 13039 still running (7190) Feb 17 07:33:38 managed-node01 ansible-async_wrapper.py[13038]: 13039 still running (7185) Feb 17 07:33:43 managed-node01 ansible-async_wrapper.py[13038]: 13039 still running (7180) Feb 17 07:33:45 managed-node01 ansible-async_wrapper.py[13039]: Module complete (13039) Feb 17 07:33:48 managed-node01 ansible-async_wrapper.py[13038]: Done in kid B. Feb 17 07:34:17 managed-node01 sshd[7920]: Received disconnect from 10.31.9.186 port 56890:11: disconnected by user Feb 17 07:34:17 managed-node01 sshd[7920]: Disconnected from user root 10.31.9.186 port 56890 Feb 17 07:34:17 managed-node01 sshd[7917]: pam_unix(sshd:session): session closed for user root Feb 17 07:34:17 managed-node01 systemd[1]: session-3.scope: Deactivated successfully. ░░ Subject: Unit succeeded ░░ Defined-By: systemd ░░ Support: https://access.redhat.com/support ░░ ░░ The unit session-3.scope has successfully entered the 'dead' state. Feb 17 07:34:17 managed-node01 systemd[1]: session-3.scope: Consumed 41.321s CPU time. ░░ Subject: Resources consumed by unit runtime ░░ Defined-By: systemd ░░ Support: https://access.redhat.com/support ░░ ░░ The unit session-3.scope completed and consumed the indicated resources. Feb 17 07:34:17 managed-node01 systemd-logind[617]: Session 3 logged out. Waiting for processes to exit. Feb 17 07:34:17 managed-node01 systemd-logind[617]: Removed session 3. ░░ Subject: Session 3 has been terminated ░░ Defined-By: systemd ░░ Support: https://access.redhat.com/support ░░ Documentation: sd-login(3) ░░ ░░ A session with the ID 3 has been terminated. Feb 17 07:34:18 managed-node01 sshd[19597]: Accepted publickey for root from 10.31.9.186 port 51562 ssh2: ECDSA SHA256:HJRTZP2wZ89Gy9vltWyT8k00ndtVCW5Uqlqbgb3Ohts Feb 17 07:34:18 managed-node01 systemd-logind[617]: New session 6 of user root. ░░ Subject: A new session 6 has been created for user root ░░ Defined-By: systemd ░░ Support: https://access.redhat.com/support ░░ Documentation: sd-login(3) ░░ ░░ A new session with the ID 6 has been created for the user root. ░░ ░░ The leading process of the session is 19597. Feb 17 07:34:18 managed-node01 systemd[1]: Started Session 6 of User root. ░░ Subject: A start job for unit session-6.scope has finished successfully ░░ Defined-By: systemd ░░ Support: https://access.redhat.com/support ░░ ░░ A start job for unit session-6.scope has finished successfully. ░░ ░░ The job identifier is 905. Feb 17 07:34:18 managed-node01 sshd[19597]: pam_unix(sshd:session): session opened for user root(uid=0) by root(uid=0) Feb 17 07:34:18 managed-node01 python3[19748]: ansible-ansible.legacy.async_status Invoked with jid=j35166807842.13035 mode=status _async_dir=/root/.ansible_async Feb 17 07:34:19 managed-node01 python3[19844]: ansible-ansible.legacy.async_status Invoked with jid=j35166807842.13035 mode=cleanup _async_dir=/root/.ansible_async Feb 17 07:34:19 managed-node01 python3[19993]: ansible-ansible.builtin.stat Invoked with path=/var/log/leapp/leapp-report.txt follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 17 07:34:21 managed-node01 python3[20442]: ansible-ansible.legacy.command Invoked with _raw_params=awk '/\(inhibitor\)/,/^-------/' /var/log/leapp/leapp-report.txt _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 17 07:34:21 managed-node01 python3[20592]: ansible-ansible.legacy.command Invoked with _raw_params=awk '/high \(error\)/,/^-------/' /var/log/leapp/leapp-report.txt _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 17 07:34:22 managed-node01 python3[20742]: ansible-ansible.legacy.stat Invoked with path=/var/log/leapp/leapp-report.json follow=True get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 17 07:34:22 managed-node01 python3[20916]: ansible-ansible.legacy.stat Invoked with path=/var/log/leapp/leapp-report.txt follow=True get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 17 07:34:24 managed-node01 python3[21090]: ansible-ansible.builtin.stat Invoked with path=/var/log/ripu/ripu.log follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 17 07:34:25 managed-node01 python3[21241]: ansible-ansible.builtin.lineinfile Invoked with path=/var/log/ripu/ripu.log line=Job ended at 2026-02-17T12:34:24Z owner=root group=root mode=0644 state=present backrefs=False create=False backup=False firstmatch=False unsafe_writes=False regexp=None search_string=None insertafter=None insertbefore=None validate=None seuser=None serole=None selevel=None setype=None attributes=None Feb 17 07:34:25 managed-node01 python3[21539]: ansible-ansible.legacy.command Invoked with _raw_params=export PATH=$PATH mv /var/log/ripu/ripu.log /var/log/ripu/ripu.log-20260217T073301 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 17 07:34:26 managed-node01 python3[21689]: ansible-ansible.builtin.stat Invoked with path=/var/log/ripu/ripu.log follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Feb 17 07:34:27 managed-node01 python3[21838]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=set -euxo pipefail rm -f /var/log/leapp/leapp-upgrade.log rm -f /var/log/ripu/ripu.log* _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Feb 17 07:34:27 managed-node01 sshd[21865]: Accepted publickey for root from 10.31.9.186 port 41492 ssh2: RSA SHA256:9j1blwt3wcrRiGYZQ7ZGu9axm3cDklH6/z4c+Ee8CzE Feb 17 07:34:27 managed-node01 systemd-logind[617]: New session 7 of user root. ░░ Subject: A new session 7 has been created for user root ░░ Defined-By: systemd ░░ Support: https://access.redhat.com/support ░░ Documentation: sd-login(3) ░░ ░░ A new session with the ID 7 has been created for the user root. ░░ ░░ The leading process of the session is 21865. Feb 17 07:34:27 managed-node01 systemd[1]: Started Session 7 of User root. ░░ Subject: A start job for unit session-7.scope has finished successfully ░░ Defined-By: systemd ░░ Support: https://access.redhat.com/support ░░ ░░ A start job for unit session-7.scope has finished successfully. ░░ ░░ The job identifier is 990. Feb 17 07:34:27 managed-node01 sshd[21865]: pam_unix(sshd:session): session opened for user root(uid=0) by root(uid=0) Feb 17 07:34:28 managed-node01 sshd[21868]: Received disconnect from 10.31.9.186 port 41492:11: disconnected by user Feb 17 07:34:28 managed-node01 sshd[21868]: Disconnected from user root 10.31.9.186 port 41492 Feb 17 07:34:28 managed-node01 sshd[21865]: pam_unix(sshd:session): session closed for user root Feb 17 07:34:28 managed-node01 systemd[1]: session-7.scope: Deactivated successfully. ░░ Subject: Unit succeeded ░░ Defined-By: systemd ░░ Support: https://access.redhat.com/support ░░ ░░ The unit session-7.scope has successfully entered the 'dead' state. Feb 17 07:34:28 managed-node01 systemd-logind[617]: Session 7 logged out. Waiting for processes to exit. Feb 17 07:34:28 managed-node01 systemd-logind[617]: Removed session 7. ░░ Subject: Session 7 has been terminated ░░ Defined-By: systemd ░░ Support: https://access.redhat.com/support ░░ Documentation: sd-login(3) ░░ ░░ A session with the ID 7 has been terminated. Feb 17 07:34:28 managed-node01 sshd[21893]: Accepted publickey for root from 10.31.9.186 port 41494 ssh2: RSA SHA256:9j1blwt3wcrRiGYZQ7ZGu9axm3cDklH6/z4c+Ee8CzE Feb 17 07:34:28 managed-node01 systemd-logind[617]: New session 8 of user root. ░░ Subject: A new session 8 has been created for user root ░░ Defined-By: systemd ░░ Support: https://access.redhat.com/support ░░ Documentation: sd-login(3) ░░ ░░ A new session with the ID 8 has been created for the user root. ░░ ░░ The leading process of the session is 21893. Feb 17 07:34:28 managed-node01 systemd[1]: Started Session 8 of User root. ░░ Subject: A start job for unit session-8.scope has finished successfully ░░ Defined-By: systemd ░░ Support: https://access.redhat.com/support ░░ ░░ A start job for unit session-8.scope has finished successfully. ░░ ░░ The job identifier is 1075. Feb 17 07:34:28 managed-node01 sshd[21893]: pam_unix(sshd:session): session opened for user root(uid=0) by root(uid=0)