[WARNING]: Collection infra.leapp does not support Ansible version 2.14.18 [WARNING]: running playbook inside collection infra.leapp ansible-playbook [core 2.14.18] config file = /etc/ansible/ansible.cfg configured module search path = ['/root/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] ansible python module location = /usr/lib/python3.9/site-packages/ansible ansible collection location = /root/.ansible/collections:/usr/share/ansible/collections executable location = /usr/bin/ansible-playbook python version = 3.9.25 (main, Jan 14 2026, 00:00:00) [GCC 11.5.0 20240719 (Red Hat 11.5.0-11)] (/usr/bin/python3) jinja version = 3.1.2 libyaml = True Using /etc/ansible/ansible.cfg as config file Skipping callback 'default', as we already have a stdout callback. Skipping callback 'minimal', as we already have a stdout callback. Skipping callback 'oneline', as we already have a stdout callback. PLAYBOOK: tests_hostvars.yml *************************************************** 1 plays in /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml PLAY [Test how analysis role generates hostvars file when it exists] *********** TASK [Gathering Facts] ********************************************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml:2 ok: [managed-node01] TASK [Сommon_upgrade_tasks | Remove leapp packages] **************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml:12 changed: [managed-node01] => {"changed": true, "changes": {"removed": ["leapp-upgrade"]}, "msg": "", "rc": 0, "results": ["Loaded plugins: product-id, search-disabled-repos, subscription-manager\n\nThis system is not registered with an entitlement server. You can use subscription-manager to register.\n\nResolving Dependencies\n--> Running transaction check\n---> Package leapp-upgrade-el7toel8.noarch 0:0.20.0-9.el7_9 will be erased\n--> Processing Dependency: leapp-repository for package: leapp-0.17.0-2.el7_9.noarch\n--> Running transaction check\n---> Package leapp.noarch 0:0.17.0-2.el7_9 will be erased\n--> Finished Dependency Resolution\n\nDependencies Resolved\n\n================================================================================\n Package Arch Version Repository Size\n================================================================================\nRemoving:\n leapp-upgrade-el7toel8 noarch 0.20.0-9.el7_9 @rhel-7-server-extras-rpms 9.7 M\nRemoving for dependencies:\n leapp noarch 0.17.0-2.el7_9 @rhel-7-server-extras-rpms 62 k\n\nTransaction Summary\n================================================================================\nRemove 1 Package (+1 Dependent package)\n\nInstalled size: 9.7 M\nDownloading packages:\nRunning transaction check\nRunning transaction test\nTransaction test succeeded\nRunning transaction\n Erasing : leapp-upgrade-el7toel8-0.20.0-9.el7_9.noarch 1/2 \n Erasing : leapp-0.17.0-2.el7_9.noarch 2/2 \n Verifying : leapp-0.17.0-2.el7_9.noarch 1/2 \n Verifying : leapp-upgrade-el7toel8-0.20.0-9.el7_9.noarch 2/2 \n\nRemoved:\n leapp-upgrade-el7toel8.noarch 0:0.20.0-9.el7_9 \n\nDependency Removed:\n leapp.noarch 0:0.17.0-2.el7_9 \n\nComplete!\n"]} TASK [Сommon_upgrade_tasks | Gather setup tasks] ******************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml:17 ok: [managed-node01 -> localhost] => {"changed": false, "examined": 4, "files": [{"atime": 1772727404.8837092, "ctime": 1772727404.7257106, "dev": 51716, "gid": 0, "gr_name": "root", "inode": 746586270, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1772727404.7257106, "nlink": 1, "path": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_cifs.yml", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 272, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}, {"atime": 1772727404.8837092, "ctime": 1772727404.7257106, "dev": 51716, "gid": 0, "gr_name": "root", "inode": 746586271, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1772727404.7257106, "nlink": 1, "path": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_remote_using_root.yml", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 268, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}, {"atime": 1772727404.8837092, "ctime": 1772727404.7267106, "dev": 51716, "gid": 0, "gr_name": "root", "inode": 746586272, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1772727404.7267106, "nlink": 1, "path": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_removed_kernel_drivers.yml", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 913, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}, {"atime": 1772727404.8837092, "ctime": 1772727404.7267106, "dev": 51716, "gid": 0, "gr_name": "root", "inode": 746586273, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1772727404.7267106, "nlink": 1, "path": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/version_lock.yml", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 548, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}], "matched": 4, "msg": "All paths examined", "skipped_paths": {}} TASK [Сommon_upgrade_tasks | Do remediation setup tasks] *********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml:26 skipping: [managed-node01] => (item=/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_cifs.yml) => {"ansible_loop_var": "setup_task_file", "changed": false, "setup_task_file": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_cifs.yml", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item=/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_remote_using_root.yml) => {"ansible_loop_var": "setup_task_file", "changed": false, "setup_task_file": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_remote_using_root.yml", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item=/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_removed_kernel_drivers.yml) => {"ansible_loop_var": "setup_task_file", "changed": false, "setup_task_file": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_removed_kernel_drivers.yml", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => {"changed": false, "msg": "All items skipped"} TASK [Сommon_upgrade_tasks | Do setup tasks] *********************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml:37 included: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/version_lock.yml for managed-node01 => (item=/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/version_lock.yml) TASK [setup | version_lock | Install versionlock module] *********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/version_lock.yml:2 changed: [managed-node01] => {"changed": true, "changes": {"installed": ["yum-plugin-versionlock"]}, "msg": "", "rc": 0, "results": ["Loaded plugins: product-id, search-disabled-repos, subscription-manager\n\nThis system is not registered with an entitlement server. You can use subscription-manager to register.\n\nResolving Dependencies\n--> Running transaction check\n---> Package yum-plugin-versionlock.noarch 0:1.1.31-54.el7_8 will be installed\n--> Finished Dependency Resolution\n\nDependencies Resolved\n\n================================================================================\n Package Arch Version Repository\n Size\n================================================================================\nInstalling:\n yum-plugin-versionlock noarch 1.1.31-54.el7_8 rhel 36 k\n\nTransaction Summary\n================================================================================\nInstall 1 Package\n\nTotal download size: 36 k\nInstalled size: 53 k\nDownloading packages:\nRunning transaction check\nRunning transaction test\nTransaction test succeeded\nRunning transaction\n Installing : yum-plugin-versionlock-1.1.31-54.el7_8.noarch 1/1 \n Verifying : yum-plugin-versionlock-1.1.31-54.el7_8.noarch 1/1 \n\nInstalled:\n yum-plugin-versionlock.noarch 0:1.1.31-54.el7_8 \n\nComplete!\n"]} TASK [setup | version_lock | Version lock the dracut package] ****************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/version_lock.yml:7 changed: [managed-node01] => {"changed": true, "cmd": ["yum", "versionlock", "add", "dracut"], "delta": "0:00:00.274010", "end": "2026-03-05 11:25:24.259315", "msg": "", "rc": 0, "start": "2026-03-05 11:25:23.985305", "stderr": "", "stderr_lines": [], "stdout": "Loaded plugins: product-id, search-disabled-repos, subscription-manager,\n : versionlock\n\nThis system is not registered with an entitlement server. You can use subscription-manager to register.\n\nAdding versionlock on: 0:dracut-033-572.el7\nversionlock added: 1", "stdout_lines": ["Loaded plugins: product-id, search-disabled-repos, subscription-manager,", " : versionlock", "", "This system is not registered with an entitlement server. You can use subscription-manager to register.", "", "Adding versionlock on: 0:dracut-033-572.el7", "versionlock added: 1"]} TASK [Test | Create tempdir directory for workdir controller] ****************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml:53 changed: [managed-node01 -> localhost] => {"changed": true, "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/tmp/workdir_controllerq1bjnwb7", "secontext": "unconfined_u:object_r:user_tmp_t:s0", "size": 6, "state": "directory", "uid": 0} TASK [Test | Prepare hostvars directory] *************************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml:59 changed: [managed-node01 -> localhost] => {"changed": true, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/tmp/workdir_controllerq1bjnwb7/host_vars", "secontext": "unconfined_u:object_r:user_tmp_t:s0", "size": 6, "state": "directory", "uid": 0} TASK [Test | Set fact with hostvars file] ************************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml:65 ok: [managed-node01 -> localhost] => {"ansible_facts": {"leapp_hostvars_file": "/tmp/workdir_controllerq1bjnwb7/host_vars/managed-node01.yml"}, "changed": false} TASK [Test | Write a sample hostvars file] ************************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml:69 changed: [managed-node01 -> localhost] => {"changed": true, "checksum": "165076eb6b9fac25e39014723e3cdb9b570bce81", "dest": "/tmp/workdir_controllerq1bjnwb7/host_vars/managed-node01.yml", "gid": 0, "group": "root", "md5sum": "b94177b40d078db8db5b3fcf744d19b1", "mode": "0600", "owner": "root", "secontext": "unconfined_u:object_r:admin_home_t:s0", "size": 221, "src": "/root/.ansible/tmp/ansible-tmp-1772727925.5939918-9483-242380577158652/source", "state": "file", "uid": 0} TASK [Test | Print hostvars file content] ************************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml:87 ok: [managed-node01 -> localhost] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} TASK [Test | Run role analysis] ************************************************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml:93 TASK [infra.leapp.analysis : Lock timestamped variables] *********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:5 ok: [managed-node01] => {"ansible_facts": {"__leapp_timestamp": "2026-03-05_16-25-27"}, "changed": false} TASK [Initialize lock, logging, and common vars] ******************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:9 TASK [infra.leapp.common : init_leapp_log | Ensure that log directory exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/init_leapp_log.yml:9 ok: [managed-node01] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/var/log/leapp", "secontext": "system_u:object_r:var_log_t:s0", "size": 69, "state": "directory", "uid": 0} TASK [infra.leapp.common : init_leapp_log | Check for existing log file] ******* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/init_leapp_log.yml:17 ok: [managed-node01] => {"changed": false, "stat": {"exists": false}} TASK [infra.leapp.common : init_leapp_log | Fail if log file already exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/init_leapp_log.yml:22 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : init_leapp_log | Create new log file] *************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/init_leapp_log.yml:31 changed: [managed-node01] => {"changed": true, "checksum": "42a652b5ac6aefad7f6f4171151b98cd8689d4f4", "dest": "/var/log/leapp/ansible_leapp_analysis.log", "gid": 0, "group": "root", "md5sum": "d111354de211a6ff5c84760b910dcdb4", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:var_log_t:s0", "size": 70, "src": "/root/.ansible/tmp/ansible-tmp-1772727928.3617272-9805-135812132884930/source", "state": "file", "uid": 0} TASK [infra.leapp.common : init_leapp_log | /etc/ansible/facts.d directory exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/init_leapp_log.yml:41 ok: [managed-node01] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc/ansible/facts.d", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 56, "state": "directory", "uid": 0} TASK [infra.leapp.common : init_leapp_log | Capture current ansible_facts for validation after upgrade] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/init_leapp_log.yml:49 changed: [managed-node01] => (item=/etc/ansible/facts.d/pre_ipu.fact) => {"ansible_loop_var": "item", "changed": true, "checksum": "d322b04466b9001bd6bfc2655c4a693931ebfe3b", "dest": "/etc/ansible/facts.d/pre_ipu.fact", "gid": 0, "group": "root", "item": "/etc/ansible/facts.d/pre_ipu.fact", "md5sum": "3f820dcad8866e8be8acbf8cc3b954d8", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:etc_t:s0", "size": 12000, "src": "/root/.ansible/tmp/ansible-tmp-1772727929.4171476-9932-33708826945971/source", "state": "file", "uid": 0} changed: [managed-node01] => (item=/var/log/leapp/ansible_leapp_analysis.log) => {"ansible_loop_var": "item", "changed": true, "checksum": "d322b04466b9001bd6bfc2655c4a693931ebfe3b", "dest": "/var/log/leapp/ansible_leapp_analysis.log", "gid": 0, "group": "root", "item": "/var/log/leapp/ansible_leapp_analysis.log", "md5sum": "3f820dcad8866e8be8acbf8cc3b954d8", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:var_log_t:s0", "size": 12000, "src": "/root/.ansible/tmp/ansible-tmp-1772727930.0642872-9932-278114238383320/source", "state": "file", "uid": 0} TASK [infra.leapp.common : init_leapp_log | Capture a list of non-rhel versioned packages] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/init_leapp_log.yml:60 ok: [managed-node01] => {"changed": false, "cmd": "set -o pipefail; export PATH=$PATH; rpm -qa | grep -ve '[\\.|+]el7' | grep -vE '^(gpg-pubkey|libmodulemd|katello-ca-consumer)' | sort", "delta": "0:00:00.346950", "end": "2026-03-05 11:25:31.210846", "failed_when_result": false, "msg": "", "rc": 0, "start": "2026-03-05 11:25:30.863896", "stderr": "", "stderr_lines": [], "stdout": "epel-release-7-14.noarch\ntps-devel-2.44.50-1.noarch", "stdout_lines": ["epel-release-7-14.noarch", "tps-devel-2.44.50-1.noarch"]} TASK [infra.leapp.common : init_leapp_log | Create fact with the non-rhel versioned packages list] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/init_leapp_log.yml:74 ok: [managed-node01] => {"ansible_facts": {"non_rhel_packages": ["epel-release-7-14.noarch", "tps-devel-2.44.50-1.noarch"]}, "changed": false} TASK [infra.leapp.common : init_leapp_log | Capture the list of non-rhel versioned packages in a separate fact file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/init_leapp_log.yml:78 ok: [managed-node01] => (item=/etc/ansible/facts.d/non_rhel_packages.fact) => {"ansible_loop_var": "item", "changed": false, "checksum": "6d36b22d9c2b2f366fc090edfbac427c77d524a5", "dest": "/etc/ansible/facts.d/non_rhel_packages.fact", "gid": 0, "group": "root", "item": "/etc/ansible/facts.d/non_rhel_packages.fact", "mode": "0644", "owner": "root", "path": "/etc/ansible/facts.d/non_rhel_packages.fact", "secontext": "system_u:object_r:etc_t:s0", "size": 58, "state": "file", "uid": 0} changed: [managed-node01] => (item=/var/log/leapp/ansible_leapp_analysis.log) => {"ansible_loop_var": "item", "changed": true, "checksum": "6d36b22d9c2b2f366fc090edfbac427c77d524a5", "dest": "/var/log/leapp/ansible_leapp_analysis.log", "gid": 0, "group": "root", "item": "/var/log/leapp/ansible_leapp_analysis.log", "md5sum": "a7d4e8abcc28ebc36ca5401fee060144", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:var_log_t:s0", "size": 58, "src": "/root/.ansible/tmp/ansible-tmp-1772727931.8477879-10182-87192764129031/source", "state": "file", "uid": 0} TASK [infra.leapp.analysis : Include tasks for preupg assistant analysis] ****** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:19 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : Include tasks for leapp preupgrade analysis] ****** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:23 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml for managed-node01 TASK [analysis-leapp | Register with Satellite activation key] ***************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:2 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [analysis-leapp | Include custom_local_repos for local_repos_pre_leapp] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:11 TASK [infra.leapp.common : custom_local_repos | Remove old /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:2 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : custom_local_repos | Validate repo definitions have baseurl or metalink] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:9 skipping: [managed-node01] => {"changed": false, "skipped_reason": "No items in the list"} TASK [infra.leapp.common : custom_local_repos | Enable custom upgrade yum repositories] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:16 skipping: [managed-node01] => {"changed": false, "skipped_reason": "No items in the list"} TASK [infra.leapp.analysis : analysis-leapp | Install packages for preupgrade analysis on RHEL 7] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:19 changed: [managed-node01] => {"changed": true, "changes": {"installed": ["leapp-upgrade"], "updated": []}, "msg": "", "rc": 0, "results": ["Loaded plugins: product-id, search-disabled-repos, subscription-manager,\n : versionlock\n\nThis system is not registered with an entitlement server. You can use subscription-manager to register.\n\nResolving Dependencies\n--> Running transaction check\n---> Package leapp-upgrade-el7toel8.noarch 0:0.20.0-9.el7_9 will be installed\n--> Processing Dependency: leapp for package: leapp-upgrade-el7toel8-0.20.0-9.el7_9.noarch\n--> Running transaction check\n---> Package leapp.noarch 0:0.17.0-2.el7_9 will be installed\n--> Finished Dependency Resolution\n\nDependencies Resolved\n\n================================================================================\n Package Arch Version Repository Size\n================================================================================\nInstalling:\n leapp-upgrade-el7toel8 noarch 0.20.0-9.el7_9 rhel-7-server-extras-rpms 1.2 M\nInstalling for dependencies:\n leapp noarch 0.17.0-2.el7_9 rhel-7-server-extras-rpms 29 k\n\nTransaction Summary\n================================================================================\nInstall 1 Package (+1 Dependent package)\n\nTotal download size: 1.3 M\nInstalled size: 9.7 M\nDownloading packages:\n--------------------------------------------------------------------------------\nTotal 6.9 MB/s | 1.3 MB 00:00 \nRunning transaction check\nRunning transaction test\nTransaction test succeeded\nRunning transaction\n Installing : leapp-upgrade-el7toel8-0.20.0-9.el7_9.noarch 1/2 \n Installing : leapp-0.17.0-2.el7_9.noarch 2/2 \n Verifying : leapp-0.17.0-2.el7_9.noarch 1/2 \n Verifying : leapp-upgrade-el7toel8-0.20.0-9.el7_9.noarch 2/2 \n\nInstalled:\n leapp-upgrade-el7toel8.noarch 0:0.20.0-9.el7_9 \n\nDependency Installed:\n leapp.noarch 0:0.17.0-2.el7_9 \n\nComplete!\n"]} TASK [infra.leapp.analysis : analysis-leapp | Install packages for preupgrade analysis on RHEL 8] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:26 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : analysis-leapp | Install packages for preupgrade analysis on RHEL 9] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:33 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : analysis-leapp | Ensure leapp log directory exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:40 ok: [managed-node01] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/var/log/leapp", "secontext": "system_u:object_r:var_log_t:s0", "size": 103, "state": "directory", "uid": 0} TASK [infra.leapp.analysis : analysis-leapp | Populate leapp_answers file] ***** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:48 changed: [managed-node01] => {"changed": true, "checksum": "3d934ad808576e3a7fb4c14a89645a4ad55ccf53", "dest": "/var/log/leapp/answerfile", "gid": 0, "group": "root", "md5sum": "01e375235c8e4cafdec593b260354063", "mode": "0644", "owner": "root", "secontext": "unconfined_u:object_r:var_log_t:s0", "size": 48, "src": "/root/.ansible/tmp/ansible-tmp-1772727936.4597633-10336-184831915668819/source", "state": "file", "uid": 0} TASK [analysis-leapp | Create /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:57 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : analysis-leapp | Leapp preupgrade report] ********* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:68 ASYNC FAILED on managed-node01: jid=j202832393176.13927 changed: [managed-node01] => {"ansible_job_id": "j202832393176.13927", "changed": true, "cmd": "set -o pipefail; export PATH=$PATH; ulimit -n 16384; leapp preupgrade --report-schema=1.2.0 --no-rhsm 2>&1 | tee -a /var/log/leapp/ansible_leapp_analysis.log\n", "delta": "0:00:40.066759", "end": "2026-03-05 11:26:17.644276", "failed_when_result": false, "finished": 1, "msg": "non-zero return code", "rc": 1, "results_file": "/root/.ansible_async/j202832393176.13927", "start": "2026-03-05 11:25:37.577517", "started": 1, "stderr": "", "stderr_lines": [], "stdout": "\n============================================================\n UNSUPPORTED UPGRADE \n============================================================\n\nVariable LEAPP_UNSUPPORTED has been detected. Proceeding at your own risk.\nDevelopment variables have been detected:\n- LEAPP_DEVEL_RPMS_ALL_SIGNED=1\n\n============================================================\n UNSUPPORTED UPGRADE \n============================================================\n\n==> Processing phase `configuration_phase`\n====> * ipu_workflow_config\n IPU workflow config actor\n==> Processing phase `FactsCollection`\n====> * scandasd\n In case of s390x architecture, check whether DASD is used.\n====> * transaction_workarounds\n Provides additional RPM transaction tasks based on bundled RPM packages.\n====> * scan_kernel_cmdline\n No documentation has been provided for the scan_kernel_cmdline actor.\n====> * read_openssh_config\n Collect information about the OpenSSH configuration.\n====> * system_facts\n Provides data about many facts from system.\n====> * tcp_wrappers_config_read\n Parse tcp_wrappers configuration files /etc/hosts.{allow,deny}.\n====> * persistentnetnames\n Get network interface information for physical ethernet interfaces of the original system.\n====> * network_manager_read_config\n Provides data about NetworkManager configuration.\n====> * load_device_driver_deprecation_data\n Loads deprecation data for drivers and devices (PCI & CPU)\n====> * scanmemory\n Scan Memory of the machine.\n====> * persistentnetnamesdisable\n Disable systemd-udevd persistent network naming on machine with single eth0 NIC\n====> * repository_mapping\n Produces message containing repository mapping based on provided file.\n====> * sssd_facts\n Check SSSD configuration for changes in RHEL8 and report them in model.\n====> * detect_kernel_drivers\n Matches all currently loaded kernel drivers against known deprecated and removed drivers.\n====> * register_yum_adjustment\n Registers a workaround which will adjust the yum directories during the upgrade.\n====> * scan_sap_hana\n Gathers information related to SAP HANA instances on the system.\n====> * udevadm_info\n Produces data exported by the \"udevadm info\" command.\n====> * scan_source_files\n Scan files (explicitly specified) of the source system.\n====> * scan_target_os_image\n Scans the provided target OS ISO image to use as a content source for the IPU, if any.\n====> * source_boot_loader_scanner\n Scans the boot loader configuration on the source system.\n====> * scan_custom_modifications_actor\n Collects information about files in leapp directories that have been modified or newly added.\n====> * authselect_scanner\n Detect what authselect configuration should be suggested to administrator.\n====> * scanzfcp\n In case of s390x architecture, check whether ZFCP is used.\n====> * scan_grub_device_name\n Find the name of the block devices where GRUB is located\n====> * scancpu\n Scan CPUs of the machine.\n====> * scan_files_for_target_userspace\n Scan the source system and identify files that will be copied into the target userspace when it is created.\n====> * scan_pkg_manager\n Provides data about package manager (yum/dnf)\n====> * get_enabled_modules\n Provides data about which module streams are enabled on the source system.\n====> * biosdevname\n Enable biosdevname on the target RHEL system if all interfaces on the source RHEL\n====> * removed_pam_modules_scanner\n Scan PAM configuration for modules that are not available in RHEL-8.\n====> * common_leapp_dracut_modules\n Influences the generation of the initram disk\n====> * sctp_read_status\n Determines whether or not the SCTP kernel module might be wanted.\n====> * scan_subscription_manager_info\n Scans the current system for subscription manager information\n====> * root_scanner\n Scan the system root directory and produce a message containing\n====> * copy_dnf_conf_into_target_userspace\n Copy dnf.conf into target userspace\n====> * scanclienablerepo\n Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.\n====> * scan_fips\n Determine whether the source system has FIPS enabled.\n====> * rpm_scanner\n Provides data about installed RPM Packages.\nLoaded plugins: product-id, subscription-manager, versionlock\n\nThis system is not registered with an entitlement server. You can use subscription-manager to register.\n\n====> * storage_scanner\n Provides data about storage settings.\n====> * scan_systemd_source\n Provides info about systemd on the source system\n====> * scan_grub_config\n Scan grub configuration files for errors.\n====> * firewalld_facts_actor\n Provide data about firewalld\n====> * pam_modules_scanner\n Scan the pam directory for services and modules used in them\n====> * check_grub_legacy\n Check whether GRUB Legacy is installed in the MBR.\n====> * get_installed_desktops\n Actor checks if kde or gnome desktop environments\n====> * selinuxcontentscanner\n Scan the system for any SELinux customizations\n====> * scan_custom_repofile\n Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.\n====> * scan_grub_device_partition_layout\n Scan all identified GRUB devices for their partition layout.\n====> * trusted_gpg_keys_scanner\n Scan for trusted GPG keys.\n====> * check_kde_apps\n Actor checks which KDE apps are installed.\n====> * pci_devices_scanner\n Provides data about existing PCI Devices.\n====> * xfs_info_scanner\n This actor scans all mounted mountpoints for XFS information\n====> * distribution_signed_rpm_scanner\n Provide data about distribution signed & unsigned RPM packages.\n====> * multipath_conf_read\n Read multipath configuration files and extract the necessary information\n====> * quagga_daemons\n Active quagga daemons check.\n====> * satellite_upgrade_facts\n Report which Satellite packages require updates and how to handle PostgreSQL data\n====> * cups_scanner\n Gather facts about CUPS features which needs to be migrated\n====> * checkrhui\n Check if system is using RHUI infrastructure (on public cloud) and send messages to\n====> * remove_obsolete_gpg_keys\n Remove obsoleted RPM GPG keys.\n====> * repositories_blacklist\n Exclude target repositories provided by Red Hat without support.\n====> * spamassassin_config_read\n Reads spamc configuration (/etc/mail/spamassassin/spamc.conf), the\n====> * vsftpd_config_read\n Reads vsftpd configuration files (/etc/vsftpd/*.conf) and extracts necessary information.\n====> * rpm_transaction_config_tasks_collector\n Provides additional RPM transaction tasks from /etc/leapp/transaction.\n====> * used_repository_scanner\n Scan used enabled repositories\n====> * scan_dynamic_linker_configuration\n Scan the dynamic linker configuration and find modifications.\n====> * ipa_scanner\n Scan system for ipa-client and ipa-server status\n====> * scan_source_kernel\n Scan the source system kernel.\n====> * pes_events_scanner\n Provides data about package events from Package Evolution Service.\n====> * setuptargetrepos\n Produces list of repositories that should be available to be used by Upgrade process.\n==> Processing phase `Checks`\n====> * check_boot_avail_space\n Check if at least 100Mib of available space on /boot. If not, inhibit the upgrade process.\n====> * check_grub_core\n Check whether we are on legacy (BIOS) system and instruct Leapp to upgrade GRUB core\n====> * check_kde_gnome\n Checks whether KDE is installed\n====> * check_yum_plugins_enabled\n Checks that the required yum plugins are enabled.\n====> * checkfstabxfsoptions\n Check the FSTAB file for the deprecated / removed XFS mount options.\n====> * checkmemory\n The actor check the size of RAM against RHEL8 minimal hardware requirements\n====> * open_ssh_algorithms\n OpenSSH configuration does not contain any unsupported cryptographic algorithms.\n====> * check_insights_auto_register\n Checks if system can be automatically registered into Red Hat Insights\n====> * enable_device_cio_free_service\n Enables device_cio_free.service systemd service on s390x\n====> * satellite_upgrade_check\n Check state of Satellite system before upgrade\n====> * unsupported_upgrade_check\n Checks environment variables and produces a warning report if the upgrade is unsupported.\n====> * sssd_check\n Check SSSD configuration for changes in RHEL8 and report them.\n====> * vsftpd_config_check\n Checks whether the vsftpd configuration is supported in RHEL-8. Namely checks that\n====> * openssh_permit_root_login\n OpenSSH no longer allows root logins with password.\n====> * check_fstab_mount_order\n Checks order of entries in /etc/fstab based on their mount point and inhibits upgrade if overshadowing is detected.\n====> * check_wireshark\n Report a couple of changes in tshark usage\n====> * check_nfs\n Check if NFS filesystem is in use. If yes, inhibit the upgrade process.\n====> * check_ipa_server\n Check for ipa-server and inhibit upgrade\n====> * efi_check_boot\n Adjust EFI boot entry for first reboot\n====> * check_skipped_repositories\n Produces a report if any repositories enabled on the system are going to be skipped.\n====> * check_root_symlinks\n Check if the symlinks /bin and /lib are relative, not absolute.\n====> * check_installed_debug_kernels\n Inhibit IPU (in-place upgrade) when multiple debug kernels are installed.\n====> * check_first_partition_offset\n Check whether the first partition starts at the offset >=1MiB.\n====> * check_rhsmsku\n Ensure the system is subscribed to the subscription manager\n====> * check_system_arch\n Check if system is running at a supported architecture. If no, inhibit the upgrade process.\n====> * removed_pam_modules\n Check for modules that are not available in RHEL 8 anymore\n====> * check_bind\n Actor parsing BIND configuration and checking for known issues in it.\n====> * checktargetrepos\n Check whether target yum repositories are specified.\n====> * red_hat_signed_rpm_check\n Check if there are packages not signed by Red Hat in use. If yes, warn user about it.\n====> * check_se_linux\n Check SELinux status and produce decision messages for further action.\n====> * check_sendmail\n Check if sendmail is installed, check whether configuration update is needed, inhibit upgrade if TCP wrappers\n====> * check_detected_devices_and_drivers\n Checks whether or not detected devices and drivers are usable on the target system.\n====> * check_sap_hana\n If SAP HANA has been detected, several checks are performed to ensure a successful upgrade.\n====> * check_docker\n Checks if Docker is installed and warns about its deprecation in RHEL8.\n====> * check_openssl_conf\n Check whether the openssl configuration and openssl-IBMCA.\n====> * check_removed_envvars\n Check for usage of removed environment variables and inhibit the upgrade\n====> * check_mount_options\n Check for mount options preventing the upgrade.\n====> * sctp_checks\n Parses collected SCTP information and take necessary actions.\n====> * check_persistent_mounts\n Check if mounts required to be persistent are mounted in persistent fashion.\n====> * check_chrony\n Check for incompatible changes in chrony configuration.\n====> * check_ntp\n Check if ntp and/or ntpdate configuration needs to be migrated.\n====> * cups_check\n Reports changes in configuration between CUPS 1.6.3 and 2.2.6\n====> * check_os_release\n Check if the current RHEL minor version is supported. If not, inhibit the upgrade process.\n====> * check_installed_devel_kernels\n Inhibit IPU (in-place upgrade) when multiple devel kernels are installed.\n====> * removed_pam_modules_check\n Check if it is all right to disable PAM modules that are not in RHEL-8.\n====> * check_cifs\n Check if CIFS filesystem is in use. If yes, inhibit the upgrade process.\n====> * spamassassin_config_check\n Reports changes in spamassassin between RHEL-7 and RHEL-8\n====> * check_custom_modifications_actor\n Checks CustomModifications messages and produces a report about files in leapp directories that have been\n====> * multipath_conf_check\n Checks whether the multipath configuration can be updated to RHEL-8 and\n====> * powertop\n Check if PowerTOP is installed. If yes, write information about non-compatible changes.\n====> * check_fips\n Inhibit upgrade if FIPS is detected as enabled.\n====> * tcp_wrappers_check\n Check the list of packages previously compiled with TCP wrappers support\n====> * check_memcached\n Check for incompatible changes in memcached configuration.\n====> * check_dynamic_linker_configuration\n Check for customization of dynamic linker configuration.\n====> * check_firewalld\n Check for certain firewalld configuration that may prevent an upgrade.\n====> * check_btrfs\n Check if Btrfs filesystem is in use. If yes, inhibit the upgrade process.\n====> * check_brltty\n Check if brltty is installed, check whether configuration update is needed.\n====> * zipl_check_boot_entries\n Inhibits the upgrade if a problematic Zipl configuration is detected on the system.\n====> * check_ha_cluster\n Check if HA Cluster is in use. If yes, inhibit the upgrade process.\n====> * check_target_iso\n Check that the provided target ISO is a valid ISO image and is located on a persistent partition.\n====> * check_etc_releasever\n Check releasever info and provide a guidance based on the facts\n====> * bacula_check\n Actor checking for presence of Bacula installation.\n====> * detect_grub_config_error\n Check grub configuration for various errors.\n====> * check_rpm_transaction_events\n Filter RPM transaction events based on installed RPM packages\n====> * checkgrep\n Check if Grep is installed. If yes, write information about non-compatible changes.\n====> * quagga_report\n Checking for babeld on RHEL-7.\n====> * check_postfix\n Check if postfix is installed, check whether configuration update is needed.\n====> * open_ssh_deprecated_directives_check\n Check for any deprecated directives in the OpenSSH configuration.\n====> * open_ssh_protocol\n Protocol configuration option was removed.\n====> * check_consumed_assets\n Check whether Leapp is using correct data assets.\n====> * check_installed_kernels\n Inhibit IPU (in-place upgrade) when installed kernels conflict with a safe upgrade.\n====> * multiple_package_versions\n Check for problematic 32bit packages installed together with 64bit ones.\n====> * checkhybridimage\n Check if the system is using Azure hybrid image.\n====> * checkdosfstools\n Check if dosfstools is installed. If yes, write information about non-compatible changes.\n====> * checkacpid\n Check if acpid is installed. If yes, write information about non-compatible changes.\n====> * checkirssi\n Check if irssi is installed. If yes, write information about non-compatible changes.\n====> * check_systemd_broken_symlinks\n Check whether some systemd symlinks are broken\n====> * python_inform_user\n This actor informs the user of differences in Python version and support in RHEL 8.\n====> * postgresql_check\n Actor checking for presence of PostgreSQL installation.\n====> * open_ssh_use_privilege_separation\n UsePrivilegeSeparation configuration option was removed.\n====> * cephvolumescan\n Retrieves the list of encrypted Ceph OSD\n====> * authselect_check\n Confirm suggested authselect call from AuthselectScanner.\n====> * check_luks_and_inhibit\n Check if any encrypted partitions is in use. If yes, inhibit the upgrade process.\n====> * check_skip_phase\n Skip all the subsequent phases until the report phase.\n==> Processing phase `Reports`\n====> * verify_check_results\n Check all dialogs and notify that user needs to make some choices.\n====> * verify_check_results\n Check all generated results messages and notify user about them.\n\nDebug output written to /var/log/leapp/leapp-preupgrade.log\n\n============================================================\n REPORT OVERVIEW \n============================================================\n\nUpgrade has been inhibited due to the following problems:\n 1. Use of NFS detected. Upgrade can't proceed\n 2. Using RHSM has been skipped but no custom or RHUI repositories have been delivered.\n 3. Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\n\nHIGH and MEDIUM severity reports:\n 1. Packages available in excluded repositories will not be installed\n 2. GRUB2 core will be automatically updated during the upgrade\n 3. Upgrade is unsupported\n 4. Difference in Python versions and support in RHEL 8\n 5. chrony using default configuration\n 6. Module pam_pkcs11 will be removed from PAM configuration\n\nReports summary:\n Errors: 0\n Inhibitors: 3\n HIGH severity reports: 4\n MEDIUM severity reports: 2\n LOW severity reports: 5\n INFO severity reports: 3\n\nBefore continuing, review the full report below for details about discovered problems and possible remediation instructions:\n A report has been generated at /var/log/leapp/leapp-report.txt\n A report has been generated at /var/log/leapp/leapp-report.json\n\n============================================================\n END OF REPORT OVERVIEW \n============================================================\n\nAnswerfile has been generated at /var/log/leapp/answerfile", "stdout_lines": ["", "============================================================", " UNSUPPORTED UPGRADE ", "============================================================", "", "Variable LEAPP_UNSUPPORTED has been detected. Proceeding at your own risk.", "Development variables have been detected:", "- LEAPP_DEVEL_RPMS_ALL_SIGNED=1", "", "============================================================", " UNSUPPORTED UPGRADE ", "============================================================", "", "==> Processing phase `configuration_phase`", "====> * ipu_workflow_config", " IPU workflow config actor", "==> Processing phase `FactsCollection`", "====> * scandasd", " In case of s390x architecture, check whether DASD is used.", "====> * transaction_workarounds", " Provides additional RPM transaction tasks based on bundled RPM packages.", "====> * scan_kernel_cmdline", " No documentation has been provided for the scan_kernel_cmdline actor.", "====> * read_openssh_config", " Collect information about the OpenSSH configuration.", "====> * system_facts", " Provides data about many facts from system.", "====> * tcp_wrappers_config_read", " Parse tcp_wrappers configuration files /etc/hosts.{allow,deny}.", "====> * persistentnetnames", " Get network interface information for physical ethernet interfaces of the original system.", "====> * network_manager_read_config", " Provides data about NetworkManager configuration.", "====> * load_device_driver_deprecation_data", " Loads deprecation data for drivers and devices (PCI & CPU)", "====> * scanmemory", " Scan Memory of the machine.", "====> * persistentnetnamesdisable", " Disable systemd-udevd persistent network naming on machine with single eth0 NIC", "====> * repository_mapping", " Produces message containing repository mapping based on provided file.", "====> * sssd_facts", " Check SSSD configuration for changes in RHEL8 and report them in model.", "====> * detect_kernel_drivers", " Matches all currently loaded kernel drivers against known deprecated and removed drivers.", "====> * register_yum_adjustment", " Registers a workaround which will adjust the yum directories during the upgrade.", "====> * scan_sap_hana", " Gathers information related to SAP HANA instances on the system.", "====> * udevadm_info", " Produces data exported by the \"udevadm info\" command.", "====> * scan_source_files", " Scan files (explicitly specified) of the source system.", "====> * scan_target_os_image", " Scans the provided target OS ISO image to use as a content source for the IPU, if any.", "====> * source_boot_loader_scanner", " Scans the boot loader configuration on the source system.", "====> * scan_custom_modifications_actor", " Collects information about files in leapp directories that have been modified or newly added.", "====> * authselect_scanner", " Detect what authselect configuration should be suggested to administrator.", "====> * scanzfcp", " In case of s390x architecture, check whether ZFCP is used.", "====> * scan_grub_device_name", " Find the name of the block devices where GRUB is located", "====> * scancpu", " Scan CPUs of the machine.", "====> * scan_files_for_target_userspace", " Scan the source system and identify files that will be copied into the target userspace when it is created.", "====> * scan_pkg_manager", " Provides data about package manager (yum/dnf)", "====> * get_enabled_modules", " Provides data about which module streams are enabled on the source system.", "====> * biosdevname", " Enable biosdevname on the target RHEL system if all interfaces on the source RHEL", "====> * removed_pam_modules_scanner", " Scan PAM configuration for modules that are not available in RHEL-8.", "====> * common_leapp_dracut_modules", " Influences the generation of the initram disk", "====> * sctp_read_status", " Determines whether or not the SCTP kernel module might be wanted.", "====> * scan_subscription_manager_info", " Scans the current system for subscription manager information", "====> * root_scanner", " Scan the system root directory and produce a message containing", "====> * copy_dnf_conf_into_target_userspace", " Copy dnf.conf into target userspace", "====> * scanclienablerepo", " Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.", "====> * scan_fips", " Determine whether the source system has FIPS enabled.", "====> * rpm_scanner", " Provides data about installed RPM Packages.", "Loaded plugins: product-id, subscription-manager, versionlock", "", "This system is not registered with an entitlement server. You can use subscription-manager to register.", "", "====> * storage_scanner", " Provides data about storage settings.", "====> * scan_systemd_source", " Provides info about systemd on the source system", "====> * scan_grub_config", " Scan grub configuration files for errors.", "====> * firewalld_facts_actor", " Provide data about firewalld", "====> * pam_modules_scanner", " Scan the pam directory for services and modules used in them", "====> * check_grub_legacy", " Check whether GRUB Legacy is installed in the MBR.", "====> * get_installed_desktops", " Actor checks if kde or gnome desktop environments", "====> * selinuxcontentscanner", " Scan the system for any SELinux customizations", "====> * scan_custom_repofile", " Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.", "====> * scan_grub_device_partition_layout", " Scan all identified GRUB devices for their partition layout.", "====> * trusted_gpg_keys_scanner", " Scan for trusted GPG keys.", "====> * check_kde_apps", " Actor checks which KDE apps are installed.", "====> * pci_devices_scanner", " Provides data about existing PCI Devices.", "====> * xfs_info_scanner", " This actor scans all mounted mountpoints for XFS information", "====> * distribution_signed_rpm_scanner", " Provide data about distribution signed & unsigned RPM packages.", "====> * multipath_conf_read", " Read multipath configuration files and extract the necessary information", "====> * quagga_daemons", " Active quagga daemons check.", "====> * satellite_upgrade_facts", " Report which Satellite packages require updates and how to handle PostgreSQL data", "====> * cups_scanner", " Gather facts about CUPS features which needs to be migrated", "====> * checkrhui", " Check if system is using RHUI infrastructure (on public cloud) and send messages to", "====> * remove_obsolete_gpg_keys", " Remove obsoleted RPM GPG keys.", "====> * repositories_blacklist", " Exclude target repositories provided by Red Hat without support.", "====> * spamassassin_config_read", " Reads spamc configuration (/etc/mail/spamassassin/spamc.conf), the", "====> * vsftpd_config_read", " Reads vsftpd configuration files (/etc/vsftpd/*.conf) and extracts necessary information.", "====> * rpm_transaction_config_tasks_collector", " Provides additional RPM transaction tasks from /etc/leapp/transaction.", "====> * used_repository_scanner", " Scan used enabled repositories", "====> * scan_dynamic_linker_configuration", " Scan the dynamic linker configuration and find modifications.", "====> * ipa_scanner", " Scan system for ipa-client and ipa-server status", "====> * scan_source_kernel", " Scan the source system kernel.", "====> * pes_events_scanner", " Provides data about package events from Package Evolution Service.", "====> * setuptargetrepos", " Produces list of repositories that should be available to be used by Upgrade process.", "==> Processing phase `Checks`", "====> * check_boot_avail_space", " Check if at least 100Mib of available space on /boot. If not, inhibit the upgrade process.", "====> * check_grub_core", " Check whether we are on legacy (BIOS) system and instruct Leapp to upgrade GRUB core", "====> * check_kde_gnome", " Checks whether KDE is installed", "====> * check_yum_plugins_enabled", " Checks that the required yum plugins are enabled.", "====> * checkfstabxfsoptions", " Check the FSTAB file for the deprecated / removed XFS mount options.", "====> * checkmemory", " The actor check the size of RAM against RHEL8 minimal hardware requirements", "====> * open_ssh_algorithms", " OpenSSH configuration does not contain any unsupported cryptographic algorithms.", "====> * check_insights_auto_register", " Checks if system can be automatically registered into Red Hat Insights", "====> * enable_device_cio_free_service", " Enables device_cio_free.service systemd service on s390x", "====> * satellite_upgrade_check", " Check state of Satellite system before upgrade", "====> * unsupported_upgrade_check", " Checks environment variables and produces a warning report if the upgrade is unsupported.", "====> * sssd_check", " Check SSSD configuration for changes in RHEL8 and report them.", "====> * vsftpd_config_check", " Checks whether the vsftpd configuration is supported in RHEL-8. Namely checks that", "====> * openssh_permit_root_login", " OpenSSH no longer allows root logins with password.", "====> * check_fstab_mount_order", " Checks order of entries in /etc/fstab based on their mount point and inhibits upgrade if overshadowing is detected.", "====> * check_wireshark", " Report a couple of changes in tshark usage", "====> * check_nfs", " Check if NFS filesystem is in use. If yes, inhibit the upgrade process.", "====> * check_ipa_server", " Check for ipa-server and inhibit upgrade", "====> * efi_check_boot", " Adjust EFI boot entry for first reboot", "====> * check_skipped_repositories", " Produces a report if any repositories enabled on the system are going to be skipped.", "====> * check_root_symlinks", " Check if the symlinks /bin and /lib are relative, not absolute.", "====> * check_installed_debug_kernels", " Inhibit IPU (in-place upgrade) when multiple debug kernels are installed.", "====> * check_first_partition_offset", " Check whether the first partition starts at the offset >=1MiB.", "====> * check_rhsmsku", " Ensure the system is subscribed to the subscription manager", "====> * check_system_arch", " Check if system is running at a supported architecture. If no, inhibit the upgrade process.", "====> * removed_pam_modules", " Check for modules that are not available in RHEL 8 anymore", "====> * check_bind", " Actor parsing BIND configuration and checking for known issues in it.", "====> * checktargetrepos", " Check whether target yum repositories are specified.", "====> * red_hat_signed_rpm_check", " Check if there are packages not signed by Red Hat in use. If yes, warn user about it.", "====> * check_se_linux", " Check SELinux status and produce decision messages for further action.", "====> * check_sendmail", " Check if sendmail is installed, check whether configuration update is needed, inhibit upgrade if TCP wrappers", "====> * check_detected_devices_and_drivers", " Checks whether or not detected devices and drivers are usable on the target system.", "====> * check_sap_hana", " If SAP HANA has been detected, several checks are performed to ensure a successful upgrade.", "====> * check_docker", " Checks if Docker is installed and warns about its deprecation in RHEL8.", "====> * check_openssl_conf", " Check whether the openssl configuration and openssl-IBMCA.", "====> * check_removed_envvars", " Check for usage of removed environment variables and inhibit the upgrade", "====> * check_mount_options", " Check for mount options preventing the upgrade.", "====> * sctp_checks", " Parses collected SCTP information and take necessary actions.", "====> * check_persistent_mounts", " Check if mounts required to be persistent are mounted in persistent fashion.", "====> * check_chrony", " Check for incompatible changes in chrony configuration.", "====> * check_ntp", " Check if ntp and/or ntpdate configuration needs to be migrated.", "====> * cups_check", " Reports changes in configuration between CUPS 1.6.3 and 2.2.6", "====> * check_os_release", " Check if the current RHEL minor version is supported. If not, inhibit the upgrade process.", "====> * check_installed_devel_kernels", " Inhibit IPU (in-place upgrade) when multiple devel kernels are installed.", "====> * removed_pam_modules_check", " Check if it is all right to disable PAM modules that are not in RHEL-8.", "====> * check_cifs", " Check if CIFS filesystem is in use. If yes, inhibit the upgrade process.", "====> * spamassassin_config_check", " Reports changes in spamassassin between RHEL-7 and RHEL-8", "====> * check_custom_modifications_actor", " Checks CustomModifications messages and produces a report about files in leapp directories that have been", "====> * multipath_conf_check", " Checks whether the multipath configuration can be updated to RHEL-8 and", "====> * powertop", " Check if PowerTOP is installed. If yes, write information about non-compatible changes.", "====> * check_fips", " Inhibit upgrade if FIPS is detected as enabled.", "====> * tcp_wrappers_check", " Check the list of packages previously compiled with TCP wrappers support", "====> * check_memcached", " Check for incompatible changes in memcached configuration.", "====> * check_dynamic_linker_configuration", " Check for customization of dynamic linker configuration.", "====> * check_firewalld", " Check for certain firewalld configuration that may prevent an upgrade.", "====> * check_btrfs", " Check if Btrfs filesystem is in use. If yes, inhibit the upgrade process.", "====> * check_brltty", " Check if brltty is installed, check whether configuration update is needed.", "====> * zipl_check_boot_entries", " Inhibits the upgrade if a problematic Zipl configuration is detected on the system.", "====> * check_ha_cluster", " Check if HA Cluster is in use. If yes, inhibit the upgrade process.", "====> * check_target_iso", " Check that the provided target ISO is a valid ISO image and is located on a persistent partition.", "====> * check_etc_releasever", " Check releasever info and provide a guidance based on the facts", "====> * bacula_check", " Actor checking for presence of Bacula installation.", "====> * detect_grub_config_error", " Check grub configuration for various errors.", "====> * check_rpm_transaction_events", " Filter RPM transaction events based on installed RPM packages", "====> * checkgrep", " Check if Grep is installed. If yes, write information about non-compatible changes.", "====> * quagga_report", " Checking for babeld on RHEL-7.", "====> * check_postfix", " Check if postfix is installed, check whether configuration update is needed.", "====> * open_ssh_deprecated_directives_check", " Check for any deprecated directives in the OpenSSH configuration.", "====> * open_ssh_protocol", " Protocol configuration option was removed.", "====> * check_consumed_assets", " Check whether Leapp is using correct data assets.", "====> * check_installed_kernels", " Inhibit IPU (in-place upgrade) when installed kernels conflict with a safe upgrade.", "====> * multiple_package_versions", " Check for problematic 32bit packages installed together with 64bit ones.", "====> * checkhybridimage", " Check if the system is using Azure hybrid image.", "====> * checkdosfstools", " Check if dosfstools is installed. If yes, write information about non-compatible changes.", "====> * checkacpid", " Check if acpid is installed. If yes, write information about non-compatible changes.", "====> * checkirssi", " Check if irssi is installed. If yes, write information about non-compatible changes.", "====> * check_systemd_broken_symlinks", " Check whether some systemd symlinks are broken", "====> * python_inform_user", " This actor informs the user of differences in Python version and support in RHEL 8.", "====> * postgresql_check", " Actor checking for presence of PostgreSQL installation.", "====> * open_ssh_use_privilege_separation", " UsePrivilegeSeparation configuration option was removed.", "====> * cephvolumescan", " Retrieves the list of encrypted Ceph OSD", "====> * authselect_check", " Confirm suggested authselect call from AuthselectScanner.", "====> * check_luks_and_inhibit", " Check if any encrypted partitions is in use. If yes, inhibit the upgrade process.", "====> * check_skip_phase", " Skip all the subsequent phases until the report phase.", "==> Processing phase `Reports`", "====> * verify_check_results", " Check all dialogs and notify that user needs to make some choices.", "====> * verify_check_results", " Check all generated results messages and notify user about them.", "", "Debug output written to /var/log/leapp/leapp-preupgrade.log", "", "============================================================", " REPORT OVERVIEW ", "============================================================", "", "Upgrade has been inhibited due to the following problems:", " 1. Use of NFS detected. Upgrade can't proceed", " 2. Using RHSM has been skipped but no custom or RHUI repositories have been delivered.", " 3. Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", "", "HIGH and MEDIUM severity reports:", " 1. Packages available in excluded repositories will not be installed", " 2. GRUB2 core will be automatically updated during the upgrade", " 3. Upgrade is unsupported", " 4. Difference in Python versions and support in RHEL 8", " 5. chrony using default configuration", " 6. Module pam_pkcs11 will be removed from PAM configuration", "", "Reports summary:", " Errors: 0", " Inhibitors: 3", " HIGH severity reports: 4", " MEDIUM severity reports: 2", " LOW severity reports: 5", " INFO severity reports: 3", "", "Before continuing, review the full report below for details about discovered problems and possible remediation instructions:", " A report has been generated at /var/log/leapp/leapp-report.txt", " A report has been generated at /var/log/leapp/leapp-report.json", "", "============================================================", " END OF REPORT OVERVIEW ", "============================================================", "", "Answerfile has been generated at /var/log/leapp/answerfile"]} TASK [analysis-leapp | Include custom_local_repos for local_repos_post_analysis] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:86 TASK [infra.leapp.common : custom_local_repos | Remove old /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:2 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : custom_local_repos | Validate repo definitions have baseurl or metalink] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:9 skipping: [managed-node01] => {"changed": false, "skipped_reason": "No items in the list"} TASK [infra.leapp.common : custom_local_repos | Enable custom upgrade yum repositories] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:16 skipping: [managed-node01] => {"changed": false, "skipped_reason": "No items in the list"} TASK [analysis-leapp | Restore original Satellite activation key] ************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:96 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : analysis-leapp | Include check-results-file.yml] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:107 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/check-results-file.yml for managed-node01 TASK [infra.leapp.analysis : check-results-file | Result file status] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/check-results-file.yml:2 ok: [managed-node01] => {"changed": false, "stat": {"atime": 1772727977.4205804, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 32, "charset": "us-ascii", "checksum": "7401ea54e3e359a1f94f6831d3b7851e98e9804a", "ctime": 1772727977.4205804, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 444596346, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1772727977.4205804, "nlink": 1, "path": "/var/log/leapp/leapp-report.txt", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 13332, "uid": 0, "version": "18446744072950365468", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} TASK [infra.leapp.analysis : check-results-file | Check that result file exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/check-results-file.yml:7 ok: [managed-node01] => { "changed": false, "msg": "All assertions passed" } TASK [analysis-leapp | Run parse_leapp_report to check for inhibitors] ********* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:110 TASK [infra.leapp.common : parse_leapp_report | Default upgrade_inhibited to false] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:12 ok: [managed-node01] => {"ansible_facts": {"upgrade_inhibited": false}, "changed": false} TASK [infra.leapp.common : parse_leapp_report | Fail if pre-upgrade analysis was not run] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:17 ok: [managed-node01] => {"changed": false, "failed_when_result": false, "stat": {"atime": 1772727998.9677596, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 32, "charset": "us-ascii", "checksum": "7401ea54e3e359a1f94f6831d3b7851e98e9804a", "ctime": 1772727977.4205804, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 444596346, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1772727977.4205804, "nlink": 1, "path": "/var/log/leapp/leapp-report.txt", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 13332, "uid": 0, "version": "18446744072950365468", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} TASK [infra.leapp.common : parse_leapp_report | Collect human readable report results] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:23 ok: [managed-node01] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} TASK [infra.leapp.common : parse_leapp_report | Collect JSON report results] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:29 ok: [managed-node01] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} TASK [infra.leapp.common : parse_leapp_report | Parse report results] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:35 ok: [managed-node01] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} TASK [infra.leapp.common : parse_leapp_report | Clear leapp_inhibitors] ******** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:42 ok: [managed-node01] => {"ansible_facts": {"leapp_inhibitors": []}, "changed": false} TASK [infra.leapp.common : parse_leapp_report | Check for inhibitors] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:46 skipping: [managed-node01] => (item={'groups': ['repository', 'failure'], 'title': 'Excluded target system repositories', 'timeStamp': '2026-03-05T16:26:08.731362Z', 'hostname': 'managed-node01', 'detail': {'remediations': [{'type': 'hint', 'context': 'If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).'}]}, 'actor': 'repositories_blacklist', 'summary': 'The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms', 'audience': 'sysadmin', 'key': '1b9132cb2362ae7830e48eee7811be9527747de8', 'id': 'cb767356e8a65a9d9027d061cbc548313cf30e8a31198c42f14a44ac17bb946b', 'severity': 'info'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "repositories_blacklist", "audience": "sysadmin", "detail": {"remediations": [{"context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "type": "hint"}]}, "groups": ["repository", "failure"], "hostname": "managed-node01", "id": "cb767356e8a65a9d9027d061cbc548313cf30e8a31198c42f14a44ac17bb946b", "key": "1b9132cb2362ae7830e48eee7811be9527747de8", "severity": "info", "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms", "timeStamp": "2026-03-05T16:26:08.731362Z", "title": "Excluded target system repositories"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['repository'], 'title': 'Packages available in excluded repositories will not be installed', 'timeStamp': '2026-03-05T16:26:12.123055Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'python3-pyxattr'}, {'scheme': 'package', 'title': 'rpcgen'}]}, 'actor': 'pes_events_scanner', 'summary': '2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled "Excluded target system repositories" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)', 'audience': 'sysadmin', 'key': '2437e204808f987477c0e9be8e4c95b3a87a9f3e', 'id': 'bcd2030bc0536d1815265cb0ba245bd2470b0fa16196bfcf5443d09e1e293bcf', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "pes_events_scanner", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "python3-pyxattr"}, {"scheme": "package", "title": "rpcgen"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "bcd2030bc0536d1815265cb0ba245bd2470b0fa16196bfcf5443d09e1e293bcf", "key": "2437e204808f987477c0e9be8e4c95b3a87a9f3e", "severity": "high", "summary": "2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", "timeStamp": "2026-03-05T16:26:12.123055Z", "title": "Packages available in excluded repositories will not be installed"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['boot'], 'title': 'GRUB2 core will be automatically updated during the upgrade', 'timeStamp': '2026-03-05T16:26:12.351980Z', 'hostname': 'managed-node01', 'actor': 'check_grub_core', 'summary': 'On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running "grub2-install" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.', 'audience': 'sysadmin', 'key': 'ac7030e05d2ee248d34f08a9fa040b352bc410a3', 'id': '9657e42d9dab334aa3d602ad03bbdca9d7e9fe840bca3944b444a83b2b67caad', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_grub_core", "audience": "sysadmin", "groups": ["boot"], "hostname": "managed-node01", "id": "9657e42d9dab334aa3d602ad03bbdca9d7e9fe840bca3944b444a83b2b67caad", "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", "severity": "high", "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", "timeStamp": "2026-03-05T16:26:12.351980Z", "title": "GRUB2 core will be automatically updated during the upgrade"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['upgrade process', 'sanity'], 'title': 'Upgrade is unsupported', 'timeStamp': '2026-03-05T16:26:12.904188Z', 'hostname': 'managed-node01', 'actor': 'unsupported_upgrade_check', 'summary': 'Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.\n', 'audience': 'sysadmin', 'key': '9e5088e3c1f371e020ec777c3d86578f4be143cf', 'id': 'f78262459c0b24ccffe9ee01ab81480975de98a2789408e9785f3bff3a670f2f', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "unsupported_upgrade_check", "audience": "sysadmin", "groups": ["upgrade process", "sanity"], "hostname": "managed-node01", "id": "f78262459c0b24ccffe9ee01ab81480975de98a2789408e9785f3bff3a670f2f", "key": "9e5088e3c1f371e020ec777c3d86578f4be143cf", "severity": "high", "summary": "Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.\n", "timeStamp": "2026-03-05T16:26:12.904188Z", "title": "Upgrade is unsupported"}, "skip_reason": "Conditional result was False"} ok: [managed-node01] => (item={'groups': ['filesystem', 'network', 'inhibitor'], 'title': "Use of NFS detected. Upgrade can't proceed", 'timeStamp': '2026-03-05T16:26:13.207833Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'file', 'title': '/etc/fstab'}], 'external': [{'url': 'https://access.redhat.com/solutions/6964006', 'title': 'Why does leapp upgrade fail on detecting NFS during upgrade?'}], 'remediations': [{'type': 'hint', 'context': 'Disable NFS temporarily for the upgrade if possible.'}]}, 'actor': 'check_nfs', 'summary': 'NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n', 'audience': 'sysadmin', 'key': '9881b25faceeeaa7a6478bcdac29afd7f6baaaed', 'id': '9a1ea0f39dd46d0d6177785cff38e23531381eb02487d3a56f9737770a3b32b1', 'severity': 'high'}) => {"ansible_facts": {"leapp_inhibitors": [{"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "9a1ea0f39dd46d0d6177785cff38e23531381eb02487d3a56f9737770a3b32b1", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2026-03-05T16:26:13.207833Z", "title": "Use of NFS detected. Upgrade can't proceed"}], "upgrade_inhibited": true}, "ansible_loop_var": "item", "changed": false, "item": {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "9a1ea0f39dd46d0d6177785cff38e23531381eb02487d3a56f9737770a3b32b1", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2026-03-05T16:26:13.207833Z", "title": "Use of NFS detected. Upgrade can't proceed"}} skipping: [managed-node01] => (item={'groups': ['repository'], 'title': 'Some enabled RPM repositories are unknown to Leapp', 'timeStamp': '2026-03-05T16:26:13.333359Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'libsolv'}, {'scheme': 'package', 'title': 'python-perf'}, {'scheme': 'package', 'title': 'kernel-tools-libs'}, {'scheme': 'package', 'title': 'libreport-filesystem'}, {'scheme': 'package', 'title': 'yum-plugin-versionlock'}, {'scheme': 'package', 'title': 'json-glib'}, {'scheme': 'package', 'title': 'librepo'}, {'scheme': 'package', 'title': 'kernel-tools'}, {'scheme': 'repository', 'title': 'rhel'}], 'remediations': [{'type': 'hint', 'context': 'You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket'}]}, 'actor': 'check_skipped_repositories', 'summary': 'The following repositories with Red Hat-signed packages are unknown to Leapp:\n- rhel\nAnd the following packages installed from those repositories may not be upgraded:\n- libsolv\n- python-perf\n- kernel-tools-libs\n- libreport-filesystem\n- yum-plugin-versionlock\n- json-glib\n- librepo\n- kernel-tools', 'audience': 'sysadmin', 'key': '8e89e20c645cea600b240156071d81c64daab7ad', 'id': '4a0e44b5a1c83613095ade6efd7a40020db0252db8a351eee7dc7a50579706f5', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_skipped_repositories", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "libsolv"}, {"scheme": "package", "title": "python-perf"}, {"scheme": "package", "title": "kernel-tools-libs"}, {"scheme": "package", "title": "libreport-filesystem"}, {"scheme": "package", "title": "yum-plugin-versionlock"}, {"scheme": "package", "title": "json-glib"}, {"scheme": "package", "title": "librepo"}, {"scheme": "package", "title": "kernel-tools"}, {"scheme": "repository", "title": "rhel"}], "remediations": [{"context": "You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket", "type": "hint"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "4a0e44b5a1c83613095ade6efd7a40020db0252db8a351eee7dc7a50579706f5", "key": "8e89e20c645cea600b240156071d81c64daab7ad", "severity": "low", "summary": "The following repositories with Red Hat-signed packages are unknown to Leapp:\n- rhel\nAnd the following packages installed from those repositories may not be upgraded:\n- libsolv\n- python-perf\n- kernel-tools-libs\n- libreport-filesystem\n- yum-plugin-versionlock\n- json-glib\n- librepo\n- kernel-tools", "timeStamp": "2026-03-05T16:26:13.333359Z", "title": "Some enabled RPM repositories are unknown to Leapp"}, "skip_reason": "Conditional result was False"} ok: [managed-node01] => (item={'groups': ['sanity', 'inhibitor'], 'title': 'Using RHSM has been skipped but no custom or RHUI repositories have been delivered.', 'timeStamp': '2026-03-05T16:26:13.913299Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'file', 'title': '/etc/leapp/files/leapp_upgrade_repositories.repo'}], 'external': [{'url': 'https://red.ht/upgrading-rhel7-to-rhel8-main-official-doc', 'title': 'UPGRADING TO RHEL 8'}], 'remediations': [{'type': 'hint', 'context': 'Create the repository file according to instructions in the referred document on the following path with all repositories that should be used during the upgrade: "/etc/leapp/files/leapp_upgrade_repositories.repo".\n\n'}]}, 'actor': 'checktargetrepos', 'summary': 'Leapp is run in the mode when the Red Hat Subscription Manager is not used (the --no-rhsm option or the LEAPP_NO_RHSM=1 environment variable has been set) so leapp is not able to obtain YUM/DNF repositories with the content for the target system in the standard way. The content has to be delivered either by user manually or, in case of public clouds, by a special Leapp package for RHUI environments.', 'audience': 'sysadmin', 'key': 'cbf9e2a5e21f047ae0954fb5e0fc0f21b02dcbb0', 'id': '45e382fe88e2d4c5ad2cab8f42fc5c2d248f7744a3c5ae6e8d85434c23e94fa6', 'severity': 'high'}) => {"ansible_facts": {"leapp_inhibitors": [{"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "9a1ea0f39dd46d0d6177785cff38e23531381eb02487d3a56f9737770a3b32b1", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2026-03-05T16:26:13.207833Z", "title": "Use of NFS detected. Upgrade can't proceed"}, {"actor": "checktargetrepos", "audience": "sysadmin", "detail": {"external": [{"title": "UPGRADING TO RHEL 8", "url": "https://red.ht/upgrading-rhel7-to-rhel8-main-official-doc"}], "related_resources": [{"scheme": "file", "title": "/etc/leapp/files/leapp_upgrade_repositories.repo"}], "remediations": [{"context": "Create the repository file according to instructions in the referred document on the following path with all repositories that should be used during the upgrade: \"/etc/leapp/files/leapp_upgrade_repositories.repo\".\n\n", "type": "hint"}]}, "groups": ["sanity", "inhibitor"], "hostname": "managed-node01", "id": "45e382fe88e2d4c5ad2cab8f42fc5c2d248f7744a3c5ae6e8d85434c23e94fa6", "key": "cbf9e2a5e21f047ae0954fb5e0fc0f21b02dcbb0", "severity": "high", "summary": "Leapp is run in the mode when the Red Hat Subscription Manager is not used (the --no-rhsm option or the LEAPP_NO_RHSM=1 environment variable has been set) so leapp is not able to obtain YUM/DNF repositories with the content for the target system in the standard way. The content has to be delivered either by user manually or, in case of public clouds, by a special Leapp package for RHUI environments.", "timeStamp": "2026-03-05T16:26:13.913299Z", "title": "Using RHSM has been skipped but no custom or RHUI repositories have been delivered."}], "upgrade_inhibited": true}, "ansible_loop_var": "item", "changed": false, "item": {"actor": "checktargetrepos", "audience": "sysadmin", "detail": {"external": [{"title": "UPGRADING TO RHEL 8", "url": "https://red.ht/upgrading-rhel7-to-rhel8-main-official-doc"}], "related_resources": [{"scheme": "file", "title": "/etc/leapp/files/leapp_upgrade_repositories.repo"}], "remediations": [{"context": "Create the repository file according to instructions in the referred document on the following path with all repositories that should be used during the upgrade: \"/etc/leapp/files/leapp_upgrade_repositories.repo\".\n\n", "type": "hint"}]}, "groups": ["sanity", "inhibitor"], "hostname": "managed-node01", "id": "45e382fe88e2d4c5ad2cab8f42fc5c2d248f7744a3c5ae6e8d85434c23e94fa6", "key": "cbf9e2a5e21f047ae0954fb5e0fc0f21b02dcbb0", "severity": "high", "summary": "Leapp is run in the mode when the Red Hat Subscription Manager is not used (the --no-rhsm option or the LEAPP_NO_RHSM=1 environment variable has been set) so leapp is not able to obtain YUM/DNF repositories with the content for the target system in the standard way. The content has to be delivered either by user manually or, in case of public clouds, by a special Leapp package for RHUI environments.", "timeStamp": "2026-03-05T16:26:13.913299Z", "title": "Using RHSM has been skipped but no custom or RHUI repositories have been delivered."}} skipping: [managed-node01] => (item={'groups': ['selinux', 'security'], 'title': 'SElinux relabeling will be scheduled', 'timeStamp': '2026-03-05T16:26:14.004563Z', 'hostname': 'managed-node01', 'actor': 'check_se_linux', 'summary': 'SElinux relabeling will be scheduled as the status is permissive/enforcing.', 'audience': 'sysadmin', 'key': '8fb81863f8413bd617c2a55b69b8e10ff03d7c72', 'id': '3fd8dd1a8eb23ba508fa815a9d1c4515e8de7c5786b691fe196dce2530c58021', 'severity': 'info'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_se_linux", "audience": "sysadmin", "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "3fd8dd1a8eb23ba508fa815a9d1c4515e8de7c5786b691fe196dce2530c58021", "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", "severity": "info", "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", "timeStamp": "2026-03-05T16:26:14.004563Z", "title": "SElinux relabeling will be scheduled"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['selinux', 'security'], 'title': 'SElinux will be set to permissive mode', 'timeStamp': '2026-03-05T16:26:14.009413Z', 'hostname': 'managed-node01', 'detail': {'remediations': [{'type': 'hint', 'context': 'Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the "/root/tmp_leapp_py3" SElinux warnings.'}]}, 'actor': 'check_se_linux', 'summary': 'SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.', 'audience': 'sysadmin', 'key': '39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f', 'id': 'c7976a30c10699248d6572ba2978ea1e4049d9ae7d24921edf9757f13b123f5c', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_se_linux", "audience": "sysadmin", "detail": {"remediations": [{"context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.", "type": "hint"}]}, "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "c7976a30c10699248d6572ba2978ea1e4049d9ae7d24921edf9757f13b123f5c", "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", "severity": "low", "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", "timeStamp": "2026-03-05T16:26:14.009413Z", "title": "SElinux will be set to permissive mode"}, "skip_reason": "Conditional result was False"} ok: [managed-node01] => (item={'groups': ['kernel', 'drivers', 'inhibitor'], 'title': 'Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.', 'timeStamp': '2026-03-05T16:26:14.145498Z', 'hostname': 'managed-node01', 'detail': {'external': [{'url': 'https://access.redhat.com/solutions/6971716', 'title': 'Leapp preupgrade getting "Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed." '}, {'url': 'https://access.redhat.com/solutions/5436131', 'title': 'Leapp upgrade fail with error "Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."'}]}, 'actor': 'check_detected_devices_and_drivers', 'summary': 'Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n', 'audience': 'sysadmin', 'key': 'f08a07da902958defa4f5c2699fae9ec2eb67c5b', 'id': 'd9fb1c5db9b5ea593a2647ed0c303e4743700d793bd802fcf69f876d8c32e110', 'severity': 'high'}) => {"ansible_facts": {"leapp_inhibitors": [{"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "9a1ea0f39dd46d0d6177785cff38e23531381eb02487d3a56f9737770a3b32b1", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2026-03-05T16:26:13.207833Z", "title": "Use of NFS detected. Upgrade can't proceed"}, {"actor": "checktargetrepos", "audience": "sysadmin", "detail": {"external": [{"title": "UPGRADING TO RHEL 8", "url": "https://red.ht/upgrading-rhel7-to-rhel8-main-official-doc"}], "related_resources": [{"scheme": "file", "title": "/etc/leapp/files/leapp_upgrade_repositories.repo"}], "remediations": [{"context": "Create the repository file according to instructions in the referred document on the following path with all repositories that should be used during the upgrade: \"/etc/leapp/files/leapp_upgrade_repositories.repo\".\n\n", "type": "hint"}]}, "groups": ["sanity", "inhibitor"], "hostname": "managed-node01", "id": "45e382fe88e2d4c5ad2cab8f42fc5c2d248f7744a3c5ae6e8d85434c23e94fa6", "key": "cbf9e2a5e21f047ae0954fb5e0fc0f21b02dcbb0", "severity": "high", "summary": "Leapp is run in the mode when the Red Hat Subscription Manager is not used (the --no-rhsm option or the LEAPP_NO_RHSM=1 environment variable has been set) so leapp is not able to obtain YUM/DNF repositories with the content for the target system in the standard way. The content has to be delivered either by user manually or, in case of public clouds, by a special Leapp package for RHUI environments.", "timeStamp": "2026-03-05T16:26:13.913299Z", "title": "Using RHSM has been skipped but no custom or RHUI repositories have been delivered."}, {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "d9fb1c5db9b5ea593a2647ed0c303e4743700d793bd802fcf69f876d8c32e110", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2026-03-05T16:26:14.145498Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}], "upgrade_inhibited": true}, "ansible_loop_var": "item", "changed": false, "item": {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "d9fb1c5db9b5ea593a2647ed0c303e4743700d793bd802fcf69f876d8c32e110", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2026-03-05T16:26:14.145498Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}} skipping: [managed-node01] => (item={'groups': ['services', 'time management'], 'title': 'chrony using default configuration', 'timeStamp': '2026-03-05T16:26:14.642014Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'ntpd'}, {'scheme': 'package', 'title': 'chrony'}, {'scheme': 'file', 'title': '/etc/chrony.conf'}]}, 'actor': 'check_chrony', 'summary': 'default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives', 'audience': 'sysadmin', 'key': 'c4222ebd18730a76f6bc7b3b66df898b106e6554', 'id': '6748043c5275ffd4a67ae6e50aaa67a3256bcf9437d0f0fd7c33807db640cd0b', 'severity': 'medium'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_chrony", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "ntpd"}, {"scheme": "package", "title": "chrony"}, {"scheme": "file", "title": "/etc/chrony.conf"}]}, "groups": ["services", "time management"], "hostname": "managed-node01", "id": "6748043c5275ffd4a67ae6e50aaa67a3256bcf9437d0f0fd7c33807db640cd0b", "key": "c4222ebd18730a76f6bc7b3b66df898b106e6554", "severity": "medium", "summary": "default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives", "timeStamp": "2026-03-05T16:26:14.642014Z", "title": "chrony using default configuration"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['authentication', 'security', 'tools'], 'title': 'Module pam_pkcs11 will be removed from PAM configuration', 'timeStamp': '2026-03-05T16:26:14.924588Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'sssd'}], 'remediations': [{'type': 'hint', 'context': 'Configure SSSD to replace pam_pkcs11'}]}, 'actor': 'removed_pam_modules_check', 'summary': 'Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.', 'audience': 'sysadmin', 'key': 'bf47e7305d6805e8bbeaa7593cf01e38030c23f3', 'id': 'c0fb9520d1b5538e315e95551ebe0e02bbdf8385282cca9f1bd8558b661e8cad', 'severity': 'medium'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "removed_pam_modules_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "sssd"}], "remediations": [{"context": "Configure SSSD to replace pam_pkcs11", "type": "hint"}]}, "groups": ["authentication", "security", "tools"], "hostname": "managed-node01", "id": "c0fb9520d1b5538e315e95551ebe0e02bbdf8385282cca9f1bd8558b661e8cad", "key": "bf47e7305d6805e8bbeaa7593cf01e38030c23f3", "severity": "medium", "summary": "Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.", "timeStamp": "2026-03-05T16:26:14.924588Z", "title": "Module pam_pkcs11 will be removed from PAM configuration"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['tools'], 'title': 'Grep has incompatible changes in the next major version', 'timeStamp': '2026-03-05T16:26:16.033621Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'grep'}], 'remediations': [{'type': 'hint', 'context': 'Please update your scripts to be compatible with the changes.'}]}, 'actor': 'checkgrep', 'summary': 'If a file contains data improperly encoded for the current locale, and this is discovered before any of the file\'s contents are output, grep now treats the file as binary.\nThe \'grep -P\' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.\nIn locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.\nWhen searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.\nThe \'grep -z\' no longer automatically treats the byte \'\\200\' as binary data.\nContext no longer excludes selected lines omitted because of -m. For example, \'grep "^" -m1 -A1\' now outputs the first two input lines, not just the first line.\n', 'audience': 'sysadmin', 'key': '94665a499e2eeee35eca3e7093a7abe183384b16', 'id': '60c531d2170987843aa05fde9673542a7a3e33b54f7a8f09553202a4005e33d5', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "checkgrep", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "grep"}], "remediations": [{"context": "Please update your scripts to be compatible with the changes.", "type": "hint"}]}, "groups": ["tools"], "hostname": "managed-node01", "id": "60c531d2170987843aa05fde9673542a7a3e33b54f7a8f09553202a4005e33d5", "key": "94665a499e2eeee35eca3e7093a7abe183384b16", "severity": "low", "summary": "If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.\nThe 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.\nIn locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.\nWhen searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.\nThe 'grep -z' no longer automatically treats the byte '\\200' as binary data.\nContext no longer excludes selected lines omitted because of -m. For example, 'grep \"^\" -m1 -A1' now outputs the first two input lines, not just the first line.\n", "timeStamp": "2026-03-05T16:26:16.033621Z", "title": "Grep has incompatible changes in the next major version"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['services', 'email'], 'title': 'Postfix has incompatible changes in the next major version', 'timeStamp': '2026-03-05T16:26:16.146637Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'postfix'}]}, 'actor': 'check_postfix', 'summary': 'Postfix 3.x has so called "compatibility safety net" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.\nThe backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.\nIt can be turned on by running: "postconf -e compatibility_level=0\nIt can be turned off by running: "postconf -e compatibility_level=2\n\nIn the Postfix MySQL database client, the default "option_group" value has changed to "client", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set "option_group" to the empty string.\n\nThe postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.\n\nPostfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to "auto", and introduces a new parameter "tls_eecdh_auto_curves" with the names of curves that may be negotiated.\n\nThe "master.cf" chroot default value has changed from "y" (yes) to "n" (no). This applies to master.cf services where chroot field is not explicitly specified.\n\nThe "append_dot_mydomain" default value has changed from "yes" to "no". You may need changing it to "yes" if senders cannot use complete domain names in e-mail addresses.\n\nThe "relay_domains" default value has changed from "$mydestination" to the empty value. This could result in unexpected "Relay access denied" errors or ETRN errors, because now will postfix by default relay only for the localhost.\n\nThe "mynetworks_style" default value has changed from "subnet" to "host". This parameter is used to implement the "permit_mynetworks" feature. The change could result in unexpected "access denied" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.\n\nPostfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.\n', 'audience': 'sysadmin', 'key': '5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33', 'id': '9d425b587bf7365b4c31b8eb16bf6f69058ef30adb974a71205b938dd32949a5', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_postfix", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "postfix"}]}, "groups": ["services", "email"], "hostname": "managed-node01", "id": "9d425b587bf7365b4c31b8eb16bf6f69058ef30adb974a71205b938dd32949a5", "key": "5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33", "severity": "low", "summary": "Postfix 3.x has so called \"compatibility safety net\" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.\nThe backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.\nIt can be turned on by running: \"postconf -e compatibility_level=0\nIt can be turned off by running: \"postconf -e compatibility_level=2\n\nIn the Postfix MySQL database client, the default \"option_group\" value has changed to \"client\", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set \"option_group\" to the empty string.\n\nThe postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.\n\nPostfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to \"auto\", and introduces a new parameter \"tls_eecdh_auto_curves\" with the names of curves that may be negotiated.\n\nThe \"master.cf\" chroot default value has changed from \"y\" (yes) to \"n\" (no). This applies to master.cf services where chroot field is not explicitly specified.\n\nThe \"append_dot_mydomain\" default value has changed from \"yes\" to \"no\". You may need changing it to \"yes\" if senders cannot use complete domain names in e-mail addresses.\n\nThe \"relay_domains\" default value has changed from \"$mydestination\" to the empty value. This could result in unexpected \"Relay access denied\" errors or ETRN errors, because now will postfix by default relay only for the localhost.\n\nThe \"mynetworks_style\" default value has changed from \"subnet\" to \"host\". This parameter is used to implement the \"permit_mynetworks\" feature. The change could result in unexpected \"access denied\" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.\n\nPostfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.\n", "timeStamp": "2026-03-05T16:26:16.146637Z", "title": "Postfix has incompatible changes in the next major version"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['filesystem'], 'title': 'Detected broken systemd symlinks for non-existing services', 'timeStamp': '2026-03-05T16:26:16.918283Z', 'hostname': 'managed-node01', 'detail': {'remediations': [{'type': 'hint', 'context': 'Remove the invalid symlinks before the upgrade.'}, {'type': 'command', 'context': ['/usr/bin/rm', '/etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service']}]}, 'actor': 'check_systemd_broken_symlinks', 'summary': 'Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:\n - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service', 'audience': 'sysadmin', 'key': 'be2083fee03f5f0a708fd193d82d2fe20aee7217', 'id': '7e83fc42c72a56fc39bc77334a36e2cdae79b4e338e796e9e67891f7c870640a', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_systemd_broken_symlinks", "audience": "sysadmin", "detail": {"remediations": [{"context": "Remove the invalid symlinks before the upgrade.", "type": "hint"}, {"context": ["/usr/bin/rm", "/etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service"], "type": "command"}]}, "groups": ["filesystem"], "hostname": "managed-node01", "id": "7e83fc42c72a56fc39bc77334a36e2cdae79b4e338e796e9e67891f7c870640a", "key": "be2083fee03f5f0a708fd193d82d2fe20aee7217", "severity": "low", "summary": "Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:\n - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", "timeStamp": "2026-03-05T16:26:16.918283Z", "title": "Detected broken systemd symlinks for non-existing services"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['python'], 'title': 'Difference in Python versions and support in RHEL 8', 'timeStamp': '2026-03-05T16:26:16.959662Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'python'}, {'scheme': 'package', 'title': 'python2'}, {'scheme': 'package', 'title': 'python3'}], 'external': [{'url': 'https://red.ht/rhel-8-python', 'title': 'Difference in Python versions and support in RHEL 8'}], 'remediations': [{'type': 'hint', 'context': 'Please run "alternatives --set python /usr/bin/python3" after upgrade'}]}, 'actor': 'python_inform_user', 'summary': "In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", 'audience': 'developer', 'key': '0c98585b1d8d252eb540bf61560094f3495351f5', 'id': '45a3df9301c782ee40ac57c4c1198e5dc30140bd82e130659485d6c031b64e43', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "python_inform_user", "audience": "developer", "detail": {"external": [{"title": "Difference in Python versions and support in RHEL 8", "url": "https://red.ht/rhel-8-python"}], "related_resources": [{"scheme": "package", "title": "python"}, {"scheme": "package", "title": "python2"}, {"scheme": "package", "title": "python3"}], "remediations": [{"context": "Please run \"alternatives --set python /usr/bin/python3\" after upgrade", "type": "hint"}]}, "groups": ["python"], "hostname": "managed-node01", "id": "45a3df9301c782ee40ac57c4c1198e5dc30140bd82e130659485d6c031b64e43", "key": "0c98585b1d8d252eb540bf61560094f3495351f5", "severity": "high", "summary": "In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", "timeStamp": "2026-03-05T16:26:16.959662Z", "title": "Difference in Python versions and support in RHEL 8"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['authentication', 'security', 'tools'], 'title': 'Current PAM and nsswitch.conf configuration will be kept.', 'timeStamp': '2026-03-05T16:26:17.204532Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'authselect'}, {'scheme': 'package', 'title': 'authconfig'}, {'scheme': 'file', 'title': '/etc/nsswitch.conf'}]}, 'actor': 'authselect_check', 'summary': 'There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.', 'audience': 'sysadmin', 'key': '40c4ab1da4a30dc1ca40e543f6385e1336d8810c', 'id': '0a4ba441ea453009696709ff7d77da04a57ed236dbfde846635c99d650f9f025', 'severity': 'info'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "authselect_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "authselect"}, {"scheme": "package", "title": "authconfig"}, {"scheme": "file", "title": "/etc/nsswitch.conf"}]}, "groups": ["authentication", "security", "tools"], "hostname": "managed-node01", "id": "0a4ba441ea453009696709ff7d77da04a57ed236dbfde846635c99d650f9f025", "key": "40c4ab1da4a30dc1ca40e543f6385e1336d8810c", "severity": "info", "summary": "There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.", "timeStamp": "2026-03-05T16:26:17.204532Z", "title": "Current PAM and nsswitch.conf configuration will be kept."}, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : parse_leapp_report | Collect inhibitors] ************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:58 ok: [managed-node01] => {"changed": false, "cmd": ["awk", "/\\(inhibitor\\)/,/^-------/", "/var/log/leapp/leapp-report.txt"], "delta": "0:00:00.003890", "end": "2026-03-05 11:26:40.597767", "failed_when_result": false, "msg": "", "rc": 0, "start": "2026-03-05 11:26:40.593877", "stderr": "", "stderr_lines": [], "stdout": "Risk Factor: high (inhibitor)\nTitle: Use of NFS detected. Upgrade can't proceed\nSummary: NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n\nRelated links:\n - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006\nRemediation: [hint] Disable NFS temporarily for the upgrade if possible.\nKey: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed\n----------------------------------------\nRisk Factor: high (inhibitor)\nTitle: Using RHSM has been skipped but no custom or RHUI repositories have been delivered.\nSummary: Leapp is run in the mode when the Red Hat Subscription Manager is not used (the --no-rhsm option or the LEAPP_NO_RHSM=1 environment variable has been set) so leapp is not able to obtain YUM/DNF repositories with the content for the target system in the standard way. The content has to be delivered either by user manually or, in case of public clouds, by a special Leapp package for RHUI environments.\nRelated links:\n - UPGRADING TO RHEL 8: https://red.ht/upgrading-rhel7-to-rhel8-main-official-doc\nRemediation: [hint] Create the repository file according to instructions in the referred document on the following path with all repositories that should be used during the upgrade: \"/etc/leapp/files/leapp_upgrade_repositories.repo\".\n\n\nKey: cbf9e2a5e21f047ae0954fb5e0fc0f21b02dcbb0\n----------------------------------------\nRisk Factor: high (inhibitor)\nTitle: Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\nSummary: Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n\nRelated links:\n - Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" : https://access.redhat.com/solutions/6971716\n - Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\": https://access.redhat.com/solutions/5436131\nKey: f08a07da902958defa4f5c2699fae9ec2eb67c5b\n----------------------------------------", "stdout_lines": ["Risk Factor: high (inhibitor)", "Title: Use of NFS detected. Upgrade can't proceed", "Summary: NFS is currently not supported by the inplace upgrade.", "We have found NFS usage at the following locations:", "- NFS shares found in /etc/fstab:", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat", " - nest.test.redhat.com:/mnt/qa /mnt/qa", " - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive", " - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch", "", "Related links:", " - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006", "Remediation: [hint] Disable NFS temporarily for the upgrade if possible.", "Key: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Using RHSM has been skipped but no custom or RHUI repositories have been delivered.", "Summary: Leapp is run in the mode when the Red Hat Subscription Manager is not used (the --no-rhsm option or the LEAPP_NO_RHSM=1 environment variable has been set) so leapp is not able to obtain YUM/DNF repositories with the content for the target system in the standard way. The content has to be delivered either by user manually or, in case of public clouds, by a special Leapp package for RHUI environments.", "Related links:", " - UPGRADING TO RHEL 8: https://red.ht/upgrading-rhel7-to-rhel8-main-official-doc", "Remediation: [hint] Create the repository file according to instructions in the referred document on the following path with all repositories that should be used during the upgrade: \"/etc/leapp/files/leapp_upgrade_repositories.repo\".", "", "", "Key: cbf9e2a5e21f047ae0954fb5e0fc0f21b02dcbb0", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", "Summary: Support for the following RHEL 7 device drivers has been removed in RHEL 8:", " - pata_acpi", "", "Related links:", " - Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" : https://access.redhat.com/solutions/6971716", " - Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\": https://access.redhat.com/solutions/5436131", "Key: f08a07da902958defa4f5c2699fae9ec2eb67c5b", "----------------------------------------"]} TASK [infra.leapp.common : parse_leapp_report | Collect high errors] *********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:67 ok: [managed-node01] => {"changed": false, "cmd": ["awk", "/high \\(error\\)/,/^-------/", "/var/log/leapp/leapp-report.txt"], "delta": "0:00:00.003772", "end": "2026-03-05 11:26:40.886607", "failed_when_result": false, "msg": "", "rc": 0, "start": "2026-03-05 11:26:40.882835", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} TASK [analysis-leapp | Copy reports to the controller] ************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:115 TASK [infra.leapp.common : copy_reports_to_controller | Ensure reports directory on controller] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/copy_reports_to_controller.yml:22 changed: [managed-node01 -> localhost] => {"changed": true, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/tmp/workdir_controllerq1bjnwb7/ansible_leapp_analysis_logs_2026-03-05_16-25-27", "secontext": "unconfined_u:object_r:user_tmp_t:s0", "size": 6, "state": "directory", "uid": 0} TASK [infra.leapp.common : copy_reports_to_controller | Copy report files to the controller] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/copy_reports_to_controller.yml:32 changed: [managed-node01] => (item=/var/log/leapp/leapp-report.txt) => {"ansible_loop_var": "item", "changed": true, "checksum": "7401ea54e3e359a1f94f6831d3b7851e98e9804a", "dest": "/tmp/workdir_controllerq1bjnwb7/ansible_leapp_analysis_logs_2026-03-05_16-25-27/managed-node01/leapp-report.txt", "item": "/var/log/leapp/leapp-report.txt", "md5sum": "1440829e5d73beb22b0f9fe19cea005f", "remote_checksum": "7401ea54e3e359a1f94f6831d3b7851e98e9804a", "remote_md5sum": null} changed: [managed-node01] => (item=/var/log/leapp/leapp-report.json) => {"ansible_loop_var": "item", "changed": true, "checksum": "c90d1bbc1218f0e51d2c08ac7785163a3635573b", "dest": "/tmp/workdir_controllerq1bjnwb7/ansible_leapp_analysis_logs_2026-03-05_16-25-27/managed-node01/leapp-report.json", "item": "/var/log/leapp/leapp-report.json", "md5sum": "68b7995ad2e5b88a69e974f41779bfb0", "remote_checksum": "c90d1bbc1218f0e51d2c08ac7785163a3635573b", "remote_md5sum": null} changed: [managed-node01] => (item=/var/log/leapp/leapp-preupgrade.log) => {"ansible_loop_var": "item", "changed": true, "checksum": "e5fefea7f3a2dfdc782fe57724ed658e60120fd2", "dest": "/tmp/workdir_controllerq1bjnwb7/ansible_leapp_analysis_logs_2026-03-05_16-25-27/managed-node01/leapp-preupgrade.log", "item": "/var/log/leapp/leapp-preupgrade.log", "md5sum": "26314040a79bdff4be4ab30f477ec093", "remote_checksum": "e5fefea7f3a2dfdc782fe57724ed658e60120fd2", "remote_md5sum": null} TASK [copy_reports_to_controller | Copy log file to the controller] ************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/copy_reports_to_controller.yml:42 TASK [infra.leapp.common : copy_archive_leapp_log | Check for log file] ******** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/copy_archive_leapp_log.yml:11 ok: [managed-node01] => {"changed": false, "stat": {"atime": 1772727932.2791805, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 40, "charset": "us-ascii", "checksum": "b040f438330490bf7f11809541650a623f341e02", "ctime": 1772727977.6195822, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 515899462, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1772727977.6195822, "nlink": 1, "path": "/var/log/leapp/ansible_leapp_analysis.log", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 18247, "uid": 0, "version": "1646597291", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} TASK [infra.leapp.common : copy_archive_leapp_log | Add end time to log file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/copy_archive_leapp_log.yml:16 changed: [managed-node01] => {"backup": "", "changed": true, "msg": "line added"} TASK [infra.leapp.common : copy_archive_leapp_log | Slurp file /var/log/leapp/ansible_leapp_analysis.log] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/copy_archive_leapp_log.yml:25 ok: [managed-node01] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} TASK [infra.leapp.common : copy_archive_leapp_log | Decode file /var/log/leapp/ansible_leapp_analysis.log] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/copy_archive_leapp_log.yml:32 ok: [managed-node01] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} TASK [infra.leapp.common : copy_archive_leapp_log | Ensure reports directory on controller] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/copy_archive_leapp_log.yml:38 ok: [managed-node01 -> localhost] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/tmp/workdir_controllerq1bjnwb7/ansible_leapp_analysis_logs_2026-03-05_16-25-27", "secontext": "unconfined_u:object_r:user_tmp_t:s0", "size": 28, "state": "directory", "uid": 0} TASK [infra.leapp.common : copy_archive_leapp_log | Copy ansible leapp log to the controller] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/copy_archive_leapp_log.yml:48 changed: [managed-node01] => {"changed": true, "checksum": "67d65f2a284037a4d60a1c101defd9ef57d32f91", "dest": "/tmp/workdir_controllerq1bjnwb7/ansible_leapp_analysis_logs_2026-03-05_16-25-27/managed-node01/ansible_leapp_analysis.log", "md5sum": "31d2fcf50ed431b8ed3887aa4abe9e61", "remote_checksum": "67d65f2a284037a4d60a1c101defd9ef57d32f91", "remote_md5sum": null} TASK [infra.leapp.common : copy_archive_leapp_log | Copy log file to timestamped location] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/copy_archive_leapp_log.yml:54 changed: [managed-node01] => {"changed": true, "checksum": "67d65f2a284037a4d60a1c101defd9ef57d32f91", "dest": "/var/log/leapp/ansible_leapp_analysis_2026-03-05_16-25-27.log", "gid": 0, "group": "root", "md5sum": "31d2fcf50ed431b8ed3887aa4abe9e61", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:var_log_t:s0", "size": 18281, "src": "/var/log/leapp/ansible_leapp_analysis.log", "state": "file", "uid": 0} TASK [infra.leapp.common : copy_archive_leapp_log | Remove original log file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/copy_archive_leapp_log.yml:66 changed: [managed-node01] => {"changed": true, "path": "/var/log/leapp/ansible_leapp_analysis.log", "state": "absent"} TASK [infra.leapp.analysis : analysis-leapp | Create remediation hostvars] ***** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:130 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/create_remediation_hostvars.yml for managed-node01 TASK [infra.leapp.analysis : create_remediation_hostvars | Clear remediation_todo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/create_remediation_hostvars.yml:2 ok: [managed-node01] => {"ansible_facts": {"leapp_remediation_todo": []}, "changed": false} TASK [infra.leapp.analysis : create_remediation_hostvars | Map inhibitors to remediation_todo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/create_remediation_hostvars.yml:6 ok: [managed-node01] => (item={'groups': ['filesystem', 'network', 'inhibitor'], 'title': "Use of NFS detected. Upgrade can't proceed", 'timeStamp': '2026-03-05T16:26:13.207833Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'file', 'title': '/etc/fstab'}], 'external': [{'url': 'https://access.redhat.com/solutions/6964006', 'title': 'Why does leapp upgrade fail on detecting NFS during upgrade?'}], 'remediations': [{'type': 'hint', 'context': 'Disable NFS temporarily for the upgrade if possible.'}]}, 'actor': 'check_nfs', 'summary': 'NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n', 'audience': 'sysadmin', 'key': '9881b25faceeeaa7a6478bcdac29afd7f6baaaed', 'id': '9a1ea0f39dd46d0d6177785cff38e23531381eb02487d3a56f9737770a3b32b1', 'severity': 'high'}) => {"ansible_facts": {"leapp_remediation_todo": ["leapp_nfs_detected"]}, "ansible_loop_var": "inhibitor", "changed": false, "inhibitor": {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "9a1ea0f39dd46d0d6177785cff38e23531381eb02487d3a56f9737770a3b32b1", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2026-03-05T16:26:13.207833Z", "title": "Use of NFS detected. Upgrade can't proceed"}} skipping: [managed-node01] => (item={'groups': ['sanity', 'inhibitor'], 'title': 'Using RHSM has been skipped but no custom or RHUI repositories have been delivered.', 'timeStamp': '2026-03-05T16:26:13.913299Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'file', 'title': '/etc/leapp/files/leapp_upgrade_repositories.repo'}], 'external': [{'url': 'https://red.ht/upgrading-rhel7-to-rhel8-main-official-doc', 'title': 'UPGRADING TO RHEL 8'}], 'remediations': [{'type': 'hint', 'context': 'Create the repository file according to instructions in the referred document on the following path with all repositories that should be used during the upgrade: "/etc/leapp/files/leapp_upgrade_repositories.repo".\n\n'}]}, 'actor': 'checktargetrepos', 'summary': 'Leapp is run in the mode when the Red Hat Subscription Manager is not used (the --no-rhsm option or the LEAPP_NO_RHSM=1 environment variable has been set) so leapp is not able to obtain YUM/DNF repositories with the content for the target system in the standard way. The content has to be delivered either by user manually or, in case of public clouds, by a special Leapp package for RHUI environments.', 'audience': 'sysadmin', 'key': 'cbf9e2a5e21f047ae0954fb5e0fc0f21b02dcbb0', 'id': '45e382fe88e2d4c5ad2cab8f42fc5c2d248f7744a3c5ae6e8d85434c23e94fa6', 'severity': 'high'}) => {"ansible_loop_var": "inhibitor", "changed": false, "inhibitor": {"actor": "checktargetrepos", "audience": "sysadmin", "detail": {"external": [{"title": "UPGRADING TO RHEL 8", "url": "https://red.ht/upgrading-rhel7-to-rhel8-main-official-doc"}], "related_resources": [{"scheme": "file", "title": "/etc/leapp/files/leapp_upgrade_repositories.repo"}], "remediations": [{"context": "Create the repository file according to instructions in the referred document on the following path with all repositories that should be used during the upgrade: \"/etc/leapp/files/leapp_upgrade_repositories.repo\".\n\n", "type": "hint"}]}, "groups": ["sanity", "inhibitor"], "hostname": "managed-node01", "id": "45e382fe88e2d4c5ad2cab8f42fc5c2d248f7744a3c5ae6e8d85434c23e94fa6", "key": "cbf9e2a5e21f047ae0954fb5e0fc0f21b02dcbb0", "severity": "high", "summary": "Leapp is run in the mode when the Red Hat Subscription Manager is not used (the --no-rhsm option or the LEAPP_NO_RHSM=1 environment variable has been set) so leapp is not able to obtain YUM/DNF repositories with the content for the target system in the standard way. The content has to be delivered either by user manually or, in case of public clouds, by a special Leapp package for RHUI environments.", "timeStamp": "2026-03-05T16:26:13.913299Z", "title": "Using RHSM has been skipped but no custom or RHUI repositories have been delivered."}, "skip_reason": "Conditional result was False"} ok: [managed-node01] => (item={'groups': ['kernel', 'drivers', 'inhibitor'], 'title': 'Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.', 'timeStamp': '2026-03-05T16:26:14.145498Z', 'hostname': 'managed-node01', 'detail': {'external': [{'url': 'https://access.redhat.com/solutions/6971716', 'title': 'Leapp preupgrade getting "Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed." '}, {'url': 'https://access.redhat.com/solutions/5436131', 'title': 'Leapp upgrade fail with error "Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."'}]}, 'actor': 'check_detected_devices_and_drivers', 'summary': 'Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n', 'audience': 'sysadmin', 'key': 'f08a07da902958defa4f5c2699fae9ec2eb67c5b', 'id': 'd9fb1c5db9b5ea593a2647ed0c303e4743700d793bd802fcf69f876d8c32e110', 'severity': 'high'}) => {"ansible_facts": {"leapp_remediation_todo": ["leapp_nfs_detected", "leapp_loaded_removed_kernel_drivers"]}, "ansible_loop_var": "inhibitor", "changed": false, "inhibitor": {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "d9fb1c5db9b5ea593a2647ed0c303e4743700d793bd802fcf69f876d8c32e110", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2026-03-05T16:26:14.145498Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}} TASK [infra.leapp.analysis : create_remediation_hostvars | Ensure host_vars directory exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/create_remediation_hostvars.yml:33 ok: [managed-node01 -> localhost] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/tmp/workdir_controllerq1bjnwb7/host_vars", "secontext": "unconfined_u:object_r:user_tmp_t:s0", "size": 32, "state": "directory", "uid": 0} TASK [infra.leapp.analysis : create_remediation_hostvars | Check if host_vars file exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/create_remediation_hostvars.yml:39 ok: [managed-node01 -> localhost] => {"changed": false, "stat": {"atime": 1772727927.3308475, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "165076eb6b9fac25e39014723e3cdb9b570bce81", "ctime": 1772727926.6098466, "dev": 51716, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 343933149, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0600", "mtime": 1772727925.9788456, "nlink": 1, "path": "/tmp/workdir_controllerq1bjnwb7/host_vars/managed-node01.yml", "pw_name": "root", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 221, "uid": 0, "version": "856623668", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} TASK [infra.leapp.analysis : create_remediation_hostvars | Read existing host_vars file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/create_remediation_hostvars.yml:44 ok: [managed-node01 -> localhost] => {"changed": false, "content": "LS0tCmxlYXBwX3N0cmluZ192YXJpYWJsZTogInRlc3QgdmFsdWUiCmxlYXBwX2RpY3RfdmFyaWFibGU6CiAga2V5MTogdmFsdWUxCiAga2V5MjogdmFsdWUyCmxlYXBwX2xpc3RfdmFyaWFibGU6CiAgLSB2YWx1ZTEKICAtIHZhbHVlMgogIC0gdmFsdWUzCmxlYXBwX2ludF92YXJpYWJsZTogMTIzCmxlYXBwX2Jvb2xfdmFyaWFibGU6IHRydWUKbGVhcHBfbnVsbF92YXJpYWJsZTogbnVsbAo=", "encoding": "base64", "source": "/tmp/workdir_controllerq1bjnwb7/host_vars/managed-node01.yml"} TASK [infra.leapp.analysis : create_remediation_hostvars | Write host_vars file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/create_remediation_hostvars.yml:50 changed: [managed-node01 -> localhost] => {"changed": true, "checksum": "369fe680a7eab324a6ad822ea7f5939c3dab8aba", "dest": "/tmp/workdir_controllerq1bjnwb7/host_vars/managed-node01.yml", "gid": 0, "group": "root", "md5sum": "3b545c8a92ddcf9cbe6dcd84185c4235", "mode": "0644", "owner": "root", "secontext": "unconfined_u:object_r:admin_home_t:s0", "size": 305, "src": "/root/.ansible/tmp/ansible-tmp-1772728006.5196216-11763-183607298322236/source", "state": "file", "uid": 0} TASK [infra.leapp.analysis : create_remediation_hostvars | Create remediation playbook file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/create_remediation_hostvars.yml:67 changed: [managed-node01 -> localhost] => {"changed": true, "checksum": "21b4da105a7b833931acbb2b42302d79170758e0", "dest": "/tmp/workdir_controllerq1bjnwb7/remediate.yml", "gid": 0, "group": "root", "md5sum": "aac94f56d084baed245cfcde9af4c23f", "mode": "0644", "owner": "root", "secontext": "unconfined_u:object_r:admin_home_t:s0", "size": 182, "src": "/root/.ansible/tmp/ansible-tmp-1772728007.0316377-11802-147765312812654/source", "state": "file", "uid": 0} TASK [infra.leapp.analysis : Set stats for leapp_inhibitors] ******************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:27 ok: [managed-node01] => {"ansible_stats": {"aggregate": true, "data": {"leapp_inhibitors": [{"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "9a1ea0f39dd46d0d6177785cff38e23531381eb02487d3a56f9737770a3b32b1", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2026-03-05T16:26:13.207833Z", "title": "Use of NFS detected. Upgrade can't proceed"}, {"actor": "checktargetrepos", "audience": "sysadmin", "detail": {"external": [{"title": "UPGRADING TO RHEL 8", "url": "https://red.ht/upgrading-rhel7-to-rhel8-main-official-doc"}], "related_resources": [{"scheme": "file", "title": "/etc/leapp/files/leapp_upgrade_repositories.repo"}], "remediations": [{"context": "Create the repository file according to instructions in the referred document on the following path with all repositories that should be used during the upgrade: \"/etc/leapp/files/leapp_upgrade_repositories.repo\".\n\n", "type": "hint"}]}, "groups": ["sanity", "inhibitor"], "hostname": "managed-node01", "id": "45e382fe88e2d4c5ad2cab8f42fc5c2d248f7744a3c5ae6e8d85434c23e94fa6", "key": "cbf9e2a5e21f047ae0954fb5e0fc0f21b02dcbb0", "severity": "high", "summary": "Leapp is run in the mode when the Red Hat Subscription Manager is not used (the --no-rhsm option or the LEAPP_NO_RHSM=1 environment variable has been set) so leapp is not able to obtain YUM/DNF repositories with the content for the target system in the standard way. The content has to be delivered either by user manually or, in case of public clouds, by a special Leapp package for RHUI environments.", "timeStamp": "2026-03-05T16:26:13.913299Z", "title": "Using RHSM has been skipped but no custom or RHUI repositories have been delivered."}, {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "d9fb1c5db9b5ea593a2647ed0c303e4743700d793bd802fcf69f876d8c32e110", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2026-03-05T16:26:14.145498Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}]}, "per_host": false}, "changed": false} TASK [infra.leapp.analysis : Notify analysis report is done handler] *********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:32 NOTIFIED HANDLER infra.leapp.analysis : Preupgrade analysis report is done for managed-node01 NOTIFIED HANDLER infra.leapp.analysis : Display inhibitors for managed-node01 NOTIFIED HANDLER infra.leapp.analysis : Display errors for managed-node01 changed: [managed-node01] => {"changed": true, "msg": "All assertions passed"} TASK [Test | Read hostvars file content] *************************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml:104 ok: [managed-node01 -> localhost] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} TASK [Test | Assert that hostvars file contains remediation_todo] ************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml:110 ok: [managed-node01 -> localhost] => { "changed": false, "msg": "All assertions passed" } TASK [Test | Print hostvars_file_content] ************************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml:116 ok: [managed-node01 -> localhost] => { "hostvars_file_content.content | b64decode | from_yaml": { "leapp_bool_variable": true, "leapp_dict_variable": { "key1": "value1", "key2": "value2" }, "leapp_int_variable": 123, "leapp_list_variable": [ "value1", "value2", "value3" ], "leapp_null_variable": null, "leapp_string_variable": "test value" } } TASK [Test | Print hostvars_file_new_content] ********************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml:120 ok: [managed-node01 -> localhost] => { "hostvars_file_new_content.content | b64decode | from_yaml": { "leapp_bool_variable": true, "leapp_dict_variable": { "key1": "value1", "key2": "value2" }, "leapp_int_variable": 123, "leapp_list_variable": [ "value1", "value2", "value3" ], "leapp_null_variable": null, "leapp_remediation_todo": [ "leapp_nfs_detected", "leapp_loaded_removed_kernel_drivers" ], "leapp_string_variable": "test value" } } TASK [Test | Print hostvars_file_new_content without remediation_todo] ********* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml:124 ok: [managed-node01 -> localhost] => { "hostvars_file_new_content.content | b64decode | from_yaml | dict2items | rejectattr('key', 'equalto', 'leapp_remediation_todo') | items2dict": { "leapp_bool_variable": true, "leapp_dict_variable": { "key1": "value1", "key2": "value2" }, "leapp_int_variable": 123, "leapp_list_variable": [ "value1", "value2", "value3" ], "leapp_null_variable": null, "leapp_string_variable": "test value" } } TASK [Test | Print hostvars_file_content] ************************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml:131 ok: [managed-node01 -> localhost] => { "hostvars_file_content.content | b64decode | from_yaml": { "leapp_bool_variable": true, "leapp_dict_variable": { "key1": "value1", "key2": "value2" }, "leapp_int_variable": 123, "leapp_list_variable": [ "value1", "value2", "value3" ], "leapp_null_variable": null, "leapp_string_variable": "test value" } } TASK [Test | Assert that hostvars_file_new_content without remediation_todo is equal to hostvars_file_content] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml:135 ok: [managed-node01 -> localhost] => { "changed": false, "msg": "All assertions passed" } RUNNING HANDLER [infra.leapp.analysis : Display inhibitors] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/handlers/main.yml:10 ok: [managed-node01] => { "results_inhibitors.stdout_lines": [ "Risk Factor: high (inhibitor)", "Title: Use of NFS detected. Upgrade can't proceed", "Summary: NFS is currently not supported by the inplace upgrade.", "We have found NFS usage at the following locations:", "- NFS shares found in /etc/fstab:", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat", " - nest.test.redhat.com:/mnt/qa /mnt/qa", " - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive", " - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch", "", "Related links:", " - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006", "Remediation: [hint] Disable NFS temporarily for the upgrade if possible.", "Key: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Using RHSM has been skipped but no custom or RHUI repositories have been delivered.", "Summary: Leapp is run in the mode when the Red Hat Subscription Manager is not used (the --no-rhsm option or the LEAPP_NO_RHSM=1 environment variable has been set) so leapp is not able to obtain YUM/DNF repositories with the content for the target system in the standard way. The content has to be delivered either by user manually or, in case of public clouds, by a special Leapp package for RHUI environments.", "Related links:", " - UPGRADING TO RHEL 8: https://red.ht/upgrading-rhel7-to-rhel8-main-official-doc", "Remediation: [hint] Create the repository file according to instructions in the referred document on the following path with all repositories that should be used during the upgrade: \"/etc/leapp/files/leapp_upgrade_repositories.repo\".", "", "", "Key: cbf9e2a5e21f047ae0954fb5e0fc0f21b02dcbb0", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", "Summary: Support for the following RHEL 7 device drivers has been removed in RHEL 8:", " - pata_acpi", "", "Related links:", " - Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" : https://access.redhat.com/solutions/6971716", " - Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\": https://access.redhat.com/solutions/5436131", "Key: f08a07da902958defa4f5c2699fae9ec2eb67c5b", "----------------------------------------" ] } RUNNING HANDLER [infra.leapp.analysis : Display errors] ************************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/handlers/main.yml:18 skipping: [managed-node01] => {} RUNNING HANDLER [infra.leapp.analysis : Preupgrade analysis report is done] **** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/handlers/main.yml:26 ok: [managed-node01] => { "msg": "The preupgrade analysis report generation is now complete. WARNING: Inhibitors found. Review the tasks above or the result file at /var/log/leapp/leapp-report.txt." } PLAY RECAP ********************************************************************* managed-node01 : ok=66 changed=21 unreachable=0 failed=0 skipped=15 rescued=0 ignored=0