[WARNING]: Collection infra.leapp does not support Ansible version 2.14.18 [WARNING]: running playbook inside collection infra.leapp ansible-playbook [core 2.14.18] config file = /etc/ansible/ansible.cfg configured module search path = ['/root/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] ansible python module location = /usr/lib/python3.9/site-packages/ansible ansible collection location = /root/.ansible/collections:/usr/share/ansible/collections executable location = /usr/bin/ansible-playbook python version = 3.9.25 (main, Jan 14 2026, 00:00:00) [GCC 11.5.0 20240719 (Red Hat 11.5.0-11)] (/usr/bin/python3) jinja version = 3.1.2 libyaml = True Using /etc/ansible/ansible.cfg as config file Skipping callback 'default', as we already have a stdout callback. Skipping callback 'minimal', as we already have a stdout callback. Skipping callback 'oneline', as we already have a stdout callback. PLAYBOOK: tests_hostvars.yml *************************************************** 1 plays in /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml PLAY [Test how analysis role generates hostvars file when it exists] *********** TASK [Gathering Facts] ********************************************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml:2 ok: [managed-node01] TASK [Сommon_upgrade_tasks | Remove leapp packages] **************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml:12 changed: [managed-node01] => {"changed": true, "msg": "", "rc": 0, "results": ["Removed: leapp-upgrade-el9toel10-0.23.0-1.el9.noarch"]} TASK [Сommon_upgrade_tasks | Gather setup tasks] ******************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml:17 ok: [managed-node01 -> localhost] => {"changed": false, "examined": 4, "files": [{"atime": 1773063033.4572275, "ctime": 1773063033.2902272, "dev": 51716, "gid": 0, "gr_name": "root", "inode": 746586270, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1773063033.2902272, "nlink": 1, "path": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_cifs.yml", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 272, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}, {"atime": 1773063033.4572275, "ctime": 1773063033.2902272, "dev": 51716, "gid": 0, "gr_name": "root", "inode": 746586271, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1773063033.2902272, "nlink": 1, "path": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_remote_using_root.yml", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 268, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}, {"atime": 1773063033.4572275, "ctime": 1773063033.2902272, "dev": 51716, "gid": 0, "gr_name": "root", "inode": 746586272, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1773063033.2902272, "nlink": 1, "path": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_removed_kernel_drivers.yml", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 913, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}, {"atime": 1773063033.4572275, "ctime": 1773063033.2902272, "dev": 51716, "gid": 0, "gr_name": "root", "inode": 746586273, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1773063033.2902272, "nlink": 1, "path": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/version_lock.yml", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 548, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}], "matched": 4, "msg": "All paths examined", "skipped_paths": {}} TASK [Сommon_upgrade_tasks | Do remediation setup tasks] *********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml:26 skipping: [managed-node01] => (item=/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_cifs.yml) => {"ansible_loop_var": "setup_task_file", "changed": false, "setup_task_file": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_cifs.yml", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item=/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_remote_using_root.yml) => {"ansible_loop_var": "setup_task_file", "changed": false, "setup_task_file": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_remote_using_root.yml", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item=/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_removed_kernel_drivers.yml) => {"ansible_loop_var": "setup_task_file", "changed": false, "setup_task_file": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_removed_kernel_drivers.yml", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => {"changed": false, "msg": "All items skipped"} TASK [Сommon_upgrade_tasks | Do setup tasks] *********************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml:37 included: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/version_lock.yml for managed-node01 => (item=/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/version_lock.yml) TASK [setup | version_lock | Install versionlock module] *********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/version_lock.yml:2 changed: [managed-node01] => {"changed": true, "msg": "", "rc": 0, "results": ["Installed: python3-dnf-plugin-versionlock-4.3.0-24.el9_7.noarch"]} TASK [setup | version_lock | Version lock the dracut package] ****************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/version_lock.yml:7 changed: [managed-node01] => {"changed": true, "cmd": ["dnf", "versionlock", "add", "dracut"], "delta": "0:00:00.605975", "end": "2026-03-09 09:38:06.167044", "msg": "", "rc": 0, "start": "2026-03-09 09:38:05.561069", "stderr": "", "stderr_lines": [], "stdout": "Updating Subscription Management repositories.\nUnable to read consumer identity\n\nThis system is not registered with an entitlement server. You can use \"rhc\" or \"subscription-manager\" to register.\n\nLast metadata expiration check: 0:01:06 ago on Mon 09 Mar 2026 09:36:59 AM EDT.\nAdding versionlock on: dracut-0:057-104.git20250919.el9_7.*", "stdout_lines": ["Updating Subscription Management repositories.", "Unable to read consumer identity", "", "This system is not registered with an entitlement server. You can use \"rhc\" or \"subscription-manager\" to register.", "", "Last metadata expiration check: 0:01:06 ago on Mon 09 Mar 2026 09:36:59 AM EDT.", "Adding versionlock on: dracut-0:057-104.git20250919.el9_7.*"]} TASK [Test | Create tempdir directory for workdir controller] ****************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml:53 changed: [managed-node01 -> localhost] => {"changed": true, "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/tmp/workdir_controllergjd6ffrh", "secontext": "unconfined_u:object_r:user_tmp_t:s0", "size": 6, "state": "directory", "uid": 0} TASK [Test | Prepare hostvars directory] *************************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml:59 changed: [managed-node01 -> localhost] => {"changed": true, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/tmp/workdir_controllergjd6ffrh/host_vars", "secontext": "unconfined_u:object_r:user_tmp_t:s0", "size": 6, "state": "directory", "uid": 0} TASK [Test | Set fact with hostvars file] ************************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml:65 ok: [managed-node01 -> localhost] => {"ansible_facts": {"leapp_hostvars_file": "/tmp/workdir_controllergjd6ffrh/host_vars/managed-node01.yml"}, "changed": false} TASK [Test | Write a sample hostvars file] ************************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml:69 changed: [managed-node01 -> localhost] => {"changed": true, "checksum": "165076eb6b9fac25e39014723e3cdb9b570bce81", "dest": "/tmp/workdir_controllergjd6ffrh/host_vars/managed-node01.yml", "gid": 0, "group": "root", "md5sum": "b94177b40d078db8db5b3fcf744d19b1", "mode": "0600", "owner": "root", "secontext": "unconfined_u:object_r:admin_home_t:s0", "size": 221, "src": "/root/.ansible/tmp/ansible-tmp-1773063487.2109678-9478-241344316081326/source", "state": "file", "uid": 0} TASK [Test | Print hostvars file content] ************************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml:87 ok: [managed-node01 -> localhost] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} TASK [Test | Run role analysis] ************************************************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml:93 TASK [infra.leapp.analysis : Lock timestamped variables] *********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:5 ok: [managed-node01] => {"ansible_facts": {"__leapp_timestamp": "2026-03-09_13-38-09"}, "changed": false} TASK [Initialize lock, logging, and common vars] ******************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:9 TASK [infra.leapp.common : init_leapp_log | Ensure that log directory exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/init_leapp_log.yml:9 ok: [managed-node01] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/var/log/leapp", "secontext": "system_u:object_r:var_log_t:s0", "size": 69, "state": "directory", "uid": 0} TASK [infra.leapp.common : init_leapp_log | Check for existing log file] ******* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/init_leapp_log.yml:17 ok: [managed-node01] => {"changed": false, "stat": {"exists": false}} TASK [infra.leapp.common : init_leapp_log | Fail if log file already exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/init_leapp_log.yml:22 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : init_leapp_log | Create new log file] *************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/init_leapp_log.yml:31 changed: [managed-node01] => {"changed": true, "checksum": "7aeb88f5307d25e11091c99e8f2ba4c36de24888", "dest": "/var/log/leapp/ansible_leapp_analysis.log", "gid": 0, "group": "root", "md5sum": "c4f99f8f24efffc4b45649ae8c19eed2", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:var_log_t:s0", "size": 70, "src": "/root/.ansible/tmp/ansible-tmp-1773063490.3429677-9712-20602445200495/source", "state": "file", "uid": 0} TASK [infra.leapp.common : init_leapp_log | /etc/ansible/facts.d directory exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/init_leapp_log.yml:41 ok: [managed-node01] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc/ansible/facts.d", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 56, "state": "directory", "uid": 0} TASK [infra.leapp.common : init_leapp_log | Capture current ansible_facts for validation after upgrade] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/init_leapp_log.yml:49 changed: [managed-node01] => (item=/etc/ansible/facts.d/pre_ipu.fact) => {"ansible_loop_var": "item", "changed": true, "checksum": "f06d961df3079180f24b5962f64eff3744a9ebbf", "dest": "/etc/ansible/facts.d/pre_ipu.fact", "gid": 0, "group": "root", "item": "/etc/ansible/facts.d/pre_ipu.fact", "md5sum": "cae6acc7b64e7cc4a7b19b0099aca84c", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:etc_t:s0", "size": 14661, "src": "/root/.ansible/tmp/ansible-tmp-1773063491.663645-9847-126866703779622/source", "state": "file", "uid": 0} changed: [managed-node01] => (item=/var/log/leapp/ansible_leapp_analysis.log) => {"ansible_loop_var": "item", "changed": true, "checksum": "f06d961df3079180f24b5962f64eff3744a9ebbf", "dest": "/var/log/leapp/ansible_leapp_analysis.log", "gid": 0, "group": "root", "item": "/var/log/leapp/ansible_leapp_analysis.log", "md5sum": "cae6acc7b64e7cc4a7b19b0099aca84c", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:var_log_t:s0", "size": 14661, "src": "/root/.ansible/tmp/ansible-tmp-1773063492.5287514-9847-186140966896834/source", "state": "file", "uid": 0} TASK [infra.leapp.common : init_leapp_log | Capture a list of non-rhel versioned packages] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/init_leapp_log.yml:60 ok: [managed-node01] => {"changed": false, "cmd": "set -o pipefail; export PATH=$PATH; rpm -qa | grep -ve '[\\.|+]el9' | grep -vE '^(gpg-pubkey|libmodulemd|katello-ca-consumer)' | sort", "delta": "0:00:00.227655", "end": "2026-03-09 09:38:13.889974", "failed_when_result": false, "msg": "non-zero return code", "rc": 1, "start": "2026-03-09 09:38:13.662319", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} TASK [infra.leapp.common : init_leapp_log | Create fact with the non-rhel versioned packages list] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/init_leapp_log.yml:74 ok: [managed-node01] => {"ansible_facts": {"non_rhel_packages": []}, "changed": false} TASK [infra.leapp.common : init_leapp_log | Capture the list of non-rhel versioned packages in a separate fact file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/init_leapp_log.yml:78 ok: [managed-node01] => (item=/etc/ansible/facts.d/non_rhel_packages.fact) => {"ansible_loop_var": "item", "changed": false, "checksum": "97d170e1550eee4afc0af065b78cda302a97674c", "dest": "/etc/ansible/facts.d/non_rhel_packages.fact", "gid": 0, "group": "root", "item": "/etc/ansible/facts.d/non_rhel_packages.fact", "mode": "0644", "owner": "root", "path": "/etc/ansible/facts.d/non_rhel_packages.fact", "secontext": "system_u:object_r:etc_t:s0", "size": 2, "state": "file", "uid": 0} changed: [managed-node01] => (item=/var/log/leapp/ansible_leapp_analysis.log) => {"ansible_loop_var": "item", "changed": true, "checksum": "97d170e1550eee4afc0af065b78cda302a97674c", "dest": "/var/log/leapp/ansible_leapp_analysis.log", "gid": 0, "group": "root", "item": "/var/log/leapp/ansible_leapp_analysis.log", "md5sum": "d751713988987e9331980363e24189ce", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:var_log_t:s0", "size": 2, "src": "/root/.ansible/tmp/ansible-tmp-1773063494.808872-10101-46279685022121/source", "state": "file", "uid": 0} TASK [infra.leapp.analysis : Include tasks for preupg assistant analysis] ****** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:19 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : Include tasks for leapp preupgrade analysis] ****** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:23 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml for managed-node01 TASK [analysis-leapp | Register with Satellite activation key] ***************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:4 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [analysis-leapp | Include custom_local_repos for local_repos_pre_leapp] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:13 TASK [infra.leapp.common : custom_local_repos | Remove old /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:2 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : custom_local_repos | Validate repo definitions have baseurl or metalink] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:9 skipping: [managed-node01] => {"changed": false, "skipped_reason": "No items in the list"} TASK [infra.leapp.common : custom_local_repos | Enable custom upgrade yum repositories] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:16 skipping: [managed-node01] => {"changed": false, "skipped_reason": "No items in the list"} TASK [infra.leapp.analysis : analysis-leapp | Install packages for preupgrade analysis on RHEL 7] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:21 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : analysis-leapp | Install packages for preupgrade analysis on RHEL 8] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:28 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : analysis-leapp | Install packages for preupgrade analysis on RHEL 9] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:35 changed: [managed-node01] => {"changed": true, "msg": "", "rc": 0, "results": ["Installed: leapp-upgrade-el9toel10-0.23.0-1.el9.noarch"]} TASK [infra.leapp.analysis : analysis-leapp | Ensure leapp log directory exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:42 changed: [managed-node01] => {"changed": true, "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/var/log/leapp", "secontext": "system_u:object_r:var_log_t:s0", "size": 103, "state": "directory", "uid": 0} TASK [infra.leapp.analysis : analysis-leapp | Populate leapp_answers file] ***** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:50 changed: [managed-node01] => {"changed": true, "checksum": "3d934ad808576e3a7fb4c14a89645a4ad55ccf53", "dest": "/var/log/leapp/answerfile", "gid": 0, "group": "root", "md5sum": "01e375235c8e4cafdec593b260354063", "mode": "0644", "owner": "root", "secontext": "unconfined_u:object_r:var_log_t:s0", "size": 48, "src": "/root/.ansible/tmp/ansible-tmp-1773063499.5157838-10509-54462278352843/source", "state": "file", "uid": 0} TASK [analysis-leapp | Create /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:59 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : analysis-leapp | Leapp preupgrade report] ********* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:70 ASYNC FAILED on managed-node01: jid=j917843827145.14377 changed: [managed-node01] => {"ansible_job_id": "j917843827145.14377", "changed": true, "cmd": "set -o pipefail; export PATH=$PATH; ulimit -n 16384; leapp preupgrade --report-schema=1.2.0 --no-rhsm 2>&1 | tee -a /var/log/leapp/ansible_leapp_analysis.log\n", "delta": "0:00:26.626198", "end": "2026-03-09 09:38:47.567729", "failed_when_result": false, "finished": 1, "msg": "non-zero return code", "rc": 1, "results_file": "/root/.ansible_async/j917843827145.14377", "start": "2026-03-09 09:38:20.941531", "started": 1, "stderr": "", "stderr_lines": [], "stdout": "\n============================================================\n UNSUPPORTED UPGRADE \n============================================================\n\nVariable LEAPP_UNSUPPORTED has been detected. Proceeding at your own risk.\nDevelopment variables have been detected:\n- LEAPP_DEVEL_RPMS_ALL_SIGNED=1\n\n============================================================\n UNSUPPORTED UPGRADE \n============================================================\n\n==> Processing phase `configuration_phase`\n====> * ipu_workflow_config\n IPU workflow config actor\n==> Processing phase `FactsCollection`\n====> * satellite_upgrade_services\n Reconfigure Satellite services\n====> * scan_custom_modifications_actor\n Collects information about files in leapp directories that have been modified or newly added.\n====> * scan_grub_device_name\n Find the name of the block devices where GRUB is located\n====> * scancryptopolicies\n Scan information about system wide set crypto policies including:\n====> * transaction_workarounds\n Provides additional RPM transaction tasks based on bundled RPM packages.\n====> * scanclienablerepo\n Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.\n====> * scan_custom_repofile\n Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.\n====> * scandasd\n In case of s390x architecture, check whether DASD is used.\n====> * scan_files_for_target_userspace\n Scan the source system and identify files that will be copied into the target userspace when it is created.\n====> * scanmemory\n Scan Memory of the machine.\n====> * ifcfg_scanner\n Scan ifcfg files with legacy network configuration\n====> * scan_grub_config\n Scan grub configuration files for errors.\n====> * get_enabled_modules\n Provides data about which module streams are enabled on the source system.\n====> * rpm_scanner\n Provides data about installed RPM Packages.\n====> * scan_kernel_cmdline\n Scan the kernel command line of the booted system.\n====> * get_installed_desktops\n Actor checks if kde or gnome desktop environments\n====> * scan_sap_hana\n Gathers information related to SAP HANA instances on the system.\n====> * migrate_rpm_db\n Register a workaround to migrate RPM DB during the upgrade.\n====> * remove_obsolete_gpg_keys\n Remove obsoleted RPM GPG keys.\n====> * scan_source_files\n Scan files (explicitly specified) of the source system.\n====> * scan_pkg_manager\n Provides data about package manager (yum/dnf)\n====> * scan_subscription_manager_info\n Scans the current system for subscription manager information\n====> * register_ruby_irb_adjustment\n Register a workaround to allow rubygem-irb's symlink -> directory conversion.\n====> * scan_target_os_image\n Scans the provided target OS ISO image to use as a content source for the IPU, if any.\n====> * repository_mapping\n Produces message containing repository mapping based on provided file.\n====> * scanzfcp\n In case of s390x architecture, check whether ZFCP is used.\n====> * distribution_signed_rpm_scanner\n Provide data about distribution signed & third-party RPM packages.\n====> * rpm_transaction_config_tasks_collector\n Provides additional RPM transaction tasks from /etc/leapp/transaction.\n====> * trusted_gpg_keys_scanner\n Scan for trusted GPG keys.\n====> * network_manager_read_config\n Provides data about NetworkManager configuration.\n====> * scan_pam_user_db\n Scan the PAM service folder for the location of pam_userdb databases\n====> * udevadm_info\n Produces data exported by the \"udevadm info\" command.\n====> * load_device_driver_deprecation_data\n Loads deprecation data for drivers and devices (PCI & CPU)\n====> * sssd_facts\n Check SSSD configuration for changes in RHEL10 and report them in model.\n====> * copy_dnf_conf_into_target_userspace\n Copy dnf.conf into target userspace\n====> * storage_scanner\n Provides data about storage settings.\n====> * read_openssh_config\n Collect information about the OpenSSH configuration.\n====> * scan_source_boot_entry\n Scan the default boot entry of the source system.\n====> * scan_mysql\n Actor checking for presence of MySQL installation.\n====> * checkrhui\n Check if system is using RHUI infrastructure (on public cloud) and send messages to\n====> * open_ssl_config_scanner\n Read an OpenSSL configuration file for further analysis.\n====> * system_facts\n Provides data about many facts from system.\n====> * xfs_info_scanner\n This actor scans all mounted mountpoints for XFS information.\n====> * persistentnetnames\n Get network interface information for physical ethernet interfaces of the original system.\n====> * scan_hybrid_image_azure\n Check if the system is using Azure hybrid image.\n====> * root_scanner\n Scan the system root directory and produce a message containing\n====> * scan_systemd_source\n Provides info about systemd on the source system\n====> * detect_kernel_drivers\n Matches all currently loaded kernel drivers against known deprecated and removed drivers.\n====> * scancpu\n Scan CPUs of the machine.\n====> * scan_default_initramfs\n Scan details of the default boot entry's initramfs image.\n====> * scan_dynamic_linker_configuration\n Scan the dynamic linker configuration and find modifications.\n====> * ipa_scanner\n Scan system for ipa-client and ipa-server status\n====> * scan_fips\n Determine whether the source system has FIPS enabled.\n====> * repositories_blacklist\n Exclude target repositories provided by Red Hat without support.\n====> * luks_scanner\n Provides data about active LUKS devices.\n====> * scan_source_kernel\n Scan the source system kernel.\n====> * pci_devices_scanner\n Provides data about existing PCI Devices.\n====> * biosdevname\n Enable biosdevname on the target RHEL system if all interfaces on the source RHEL\n====> * persistentnetnamesdisable\n Disable systemd-udevd persistent network naming on machine with single eth0 NIC\n====> * used_repository_scanner\n Scan used enabled repositories\n====> * selinuxcontentscanner\n Scan the system for any SELinux customizations\n====> * pes_events_scanner\n Provides data about package events from Package Evolution Service.\n====> * setuptargetrepos\n Produces list of repositories that should be available to be used during IPU process.\n==> Processing phase `Checks`\n====> * check_skipped_repositories\n Produces a report if any repositories enabled on the system are going to be skipped.\n====> * crypto_policies_check\n This actor consumes previously gathered information about crypto policies on the source\n====> * check_custom_modifications_actor\n Checks CustomModifications messages and produces a report about files in leapp directories that have been\n====> * check_cifs\n Check if CIFS filesystem is in use. If yes, inhibit the upgrade process.\n====> * sssd_check\n Check SSSD configuration for changes in RHEL10 and report them in model.\n====> * check_fips\n Inhibit upgrade if FIPS is detected as enabled.\n====> * unsupported_upgrade_check\n Checks environment variables and produces a warning report if the upgrade is unsupported.\n====> * check_dynamic_linker_configuration\n Check for customization of dynamic linker configuration.\n====> * cephvolumescan\n Retrieves the list of encrypted Ceph OSD\n====> * check_default_initramfs\n Checks whether the default initramfs uses problematic dracut modules.\n====> * check_etc_releasever\n Check releasever info and provide a guidance based on the facts\n====> * checktargetrepos\n Check whether target yum repositories are specified.\n====> * efi_check_boot\n Adjust EFI boot entry for first reboot\n====> * check_detected_devices_and_drivers\n Checks whether or not detected devices and drivers are usable on the target system.\n====> * check_grub_core\n Check whether we are on legacy (BIOS) system and instruct Leapp to upgrade GRUB core\n====> * check_fstab_mount_order\n Checks order of entries in /etc/fstab based on their mount point and inhibits upgrade if overshadowing is detected.\n====> * check_pam_user_db\n Create report with the location of pam_userdb databases\n====> * checkmemory\n The actor check the size of RAM against RHEL8 minimal hardware requirements\n====> * mysql_check\n Actor checking for output produced by scanmysql actor.\n====> * check_ipa_server\n Check for ipa-server and inhibit upgrade\n====> * check_old_xfs\n Check mounted XFS file systems.\n====> * check_persistent_mounts\n Check if mounts required to be persistent are mounted in persistent fashion.\n====> * check_consumed_assets\n Check whether Leapp is using correct data assets.\n====> * network_deprecations\n Ensures that network configuration doesn't rely on unsupported settings\n====> * check_boot_avail_space\n Check if at least 100Mib of available space on /boot. If not, inhibit the upgrade process.\n====> * check_insights_auto_register\n Checks if system can be automatically registered into Red Hat Insights\n====> * check_microarchitecture\n Inhibit if RHEL9 microarchitecture requirements are not satisfied\n====> * inhibit_cgroupsv1\n Inhibit upgrade if cgroups-v1 are enabled\n====> * check_luks\n Check if any encrypted partitions are in use and whether they are supported for the upgrade.\n====> * libdb_check\n Actor checking for presence of libdb(Berkeley DB) installation.\n====> * check_mount_options\n Check for mount options preventing the upgrade.\n====> * bacula_check\n Actor checking for presence of Bacula installation.\n====> * mariadb_check\n Actor checking for presence of MariaDB installation.\n====> * check_nfs\n Check if NFS filesystem is in use. If yes, inhibit the upgrade process.\n====> * check_rhsmsku\n Ensure the system is subscribed to the subscription manager\n====> * open_ssl_engines_check\n The OpenSSL in RHEL 10 has deprecated engines in favor of providers.\n====> * check_os_release\n Check if the current RHEL minor version is supported. If not, inhibit the upgrade process.\n====> * check_rhsmsca\n Ensure that a registered system is in SCA (Simple Content Access)\n====> * check_se_linux\n Check SELinux status and produce decision messages for further action.\n====> * check_sap_hana\n If SAP HANA has been detected, several checks are performed to ensure a successful upgrade.\n====> * check_root_symlinks\n Check if the symlinks /bin and /lib are relative, not absolute.\n====> * postgresql_check\n Actor checking for presence of PostgreSQL installation.\n====> * check_target_iso\n Check that the provided target ISO is a valid ISO image and is located on a persistent partition.\n====> * check_yum_plugins_enabled\n Checks that the required yum plugins are enabled.\n====> * check_system_arch\n Check if system is running at a supported architecture. If no, inhibit the upgrade process.\n====> * check_installed_kernels\n Inhibit IPU (in-place upgrade) when installed kernels conflict with a safe upgrade.\n====> * check_target_version\n Check that the target system version is supported by the upgrade process.\n====> * detect_grub_config_error\n Check grub configuration for various errors.\n====> * distribution_signed_rpm_check\n Check if there are any packages that are not signed by distribution GPG keys.\n====> * check_grubenv_to_file\n Check whether grubenv is a symlink on Azure hybrid images using BIOS.\n====> * check_systemd_broken_symlinks\n Check whether some systemd symlinks are broken\n====> * check_openssl_conf\n Check whether the openssl configuration and openssl-IBMCA.\n====> * openssh_permit_root_login\n OpenSSH no longer allows root logins with password.\n====> * check_rpm_transaction_events\n Filter RPM transaction events based on installed RPM packages\n====> * check_skip_phase\n Skip all the subsequent phases until the report phase.\n==> Processing phase `Reports`\n====> * verify_check_results\n Check all dialogs and notify that user needs to make some choices.\n====> * verify_check_results\n Check all generated results messages and notify user about them.\n\nDebug output written to /var/log/leapp/leapp-preupgrade.log\n\n============================================================\n REPORT OVERVIEW \n============================================================\n\nUpgrade has been inhibited due to the following problems:\n 1. Using RHSM has been skipped but no custom or RHUI repositories have been delivered.\n 2. Legacy network configuration found\n 3. Use of NFS detected. Upgrade can't proceed\n\nHIGH and MEDIUM severity reports:\n 1. Upgrade is unsupported\n 2. Leapp detected a processor which is no longer maintained in RHEL 10.\n 3. GRUB2 core will be automatically updated during the upgrade\n 4. Berkeley DB (libdb) has been detected on your system\n\nReports summary:\n Errors: 0\n Inhibitors: 3\n HIGH severity reports: 3\n MEDIUM severity reports: 1\n LOW severity reports: 1\n INFO severity reports: 2\n\nBefore continuing, review the full report below for details about discovered problems and possible remediation instructions:\n A report has been generated at /var/log/leapp/leapp-report.txt\n A report has been generated at /var/log/leapp/leapp-report.json\n\n============================================================\n END OF REPORT OVERVIEW \n============================================================\n\nAnswerfile has been generated at /var/log/leapp/answerfile", "stdout_lines": ["", "============================================================", " UNSUPPORTED UPGRADE ", "============================================================", "", "Variable LEAPP_UNSUPPORTED has been detected. Proceeding at your own risk.", "Development variables have been detected:", "- LEAPP_DEVEL_RPMS_ALL_SIGNED=1", "", "============================================================", " UNSUPPORTED UPGRADE ", "============================================================", "", "==> Processing phase `configuration_phase`", "====> * ipu_workflow_config", " IPU workflow config actor", "==> Processing phase `FactsCollection`", "====> * satellite_upgrade_services", " Reconfigure Satellite services", "====> * scan_custom_modifications_actor", " Collects information about files in leapp directories that have been modified or newly added.", "====> * scan_grub_device_name", " Find the name of the block devices where GRUB is located", "====> * scancryptopolicies", " Scan information about system wide set crypto policies including:", "====> * transaction_workarounds", " Provides additional RPM transaction tasks based on bundled RPM packages.", "====> * scanclienablerepo", " Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.", "====> * scan_custom_repofile", " Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.", "====> * scandasd", " In case of s390x architecture, check whether DASD is used.", "====> * scan_files_for_target_userspace", " Scan the source system and identify files that will be copied into the target userspace when it is created.", "====> * scanmemory", " Scan Memory of the machine.", "====> * ifcfg_scanner", " Scan ifcfg files with legacy network configuration", "====> * scan_grub_config", " Scan grub configuration files for errors.", "====> * get_enabled_modules", " Provides data about which module streams are enabled on the source system.", "====> * rpm_scanner", " Provides data about installed RPM Packages.", "====> * scan_kernel_cmdline", " Scan the kernel command line of the booted system.", "====> * get_installed_desktops", " Actor checks if kde or gnome desktop environments", "====> * scan_sap_hana", " Gathers information related to SAP HANA instances on the system.", "====> * migrate_rpm_db", " Register a workaround to migrate RPM DB during the upgrade.", "====> * remove_obsolete_gpg_keys", " Remove obsoleted RPM GPG keys.", "====> * scan_source_files", " Scan files (explicitly specified) of the source system.", "====> * scan_pkg_manager", " Provides data about package manager (yum/dnf)", "====> * scan_subscription_manager_info", " Scans the current system for subscription manager information", "====> * register_ruby_irb_adjustment", " Register a workaround to allow rubygem-irb's symlink -> directory conversion.", "====> * scan_target_os_image", " Scans the provided target OS ISO image to use as a content source for the IPU, if any.", "====> * repository_mapping", " Produces message containing repository mapping based on provided file.", "====> * scanzfcp", " In case of s390x architecture, check whether ZFCP is used.", "====> * distribution_signed_rpm_scanner", " Provide data about distribution signed & third-party RPM packages.", "====> * rpm_transaction_config_tasks_collector", " Provides additional RPM transaction tasks from /etc/leapp/transaction.", "====> * trusted_gpg_keys_scanner", " Scan for trusted GPG keys.", "====> * network_manager_read_config", " Provides data about NetworkManager configuration.", "====> * scan_pam_user_db", " Scan the PAM service folder for the location of pam_userdb databases", "====> * udevadm_info", " Produces data exported by the \"udevadm info\" command.", "====> * load_device_driver_deprecation_data", " Loads deprecation data for drivers and devices (PCI & CPU)", "====> * sssd_facts", " Check SSSD configuration for changes in RHEL10 and report them in model.", "====> * copy_dnf_conf_into_target_userspace", " Copy dnf.conf into target userspace", "====> * storage_scanner", " Provides data about storage settings.", "====> * read_openssh_config", " Collect information about the OpenSSH configuration.", "====> * scan_source_boot_entry", " Scan the default boot entry of the source system.", "====> * scan_mysql", " Actor checking for presence of MySQL installation.", "====> * checkrhui", " Check if system is using RHUI infrastructure (on public cloud) and send messages to", "====> * open_ssl_config_scanner", " Read an OpenSSL configuration file for further analysis.", "====> * system_facts", " Provides data about many facts from system.", "====> * xfs_info_scanner", " This actor scans all mounted mountpoints for XFS information.", "====> * persistentnetnames", " Get network interface information for physical ethernet interfaces of the original system.", "====> * scan_hybrid_image_azure", " Check if the system is using Azure hybrid image.", "====> * root_scanner", " Scan the system root directory and produce a message containing", "====> * scan_systemd_source", " Provides info about systemd on the source system", "====> * detect_kernel_drivers", " Matches all currently loaded kernel drivers against known deprecated and removed drivers.", "====> * scancpu", " Scan CPUs of the machine.", "====> * scan_default_initramfs", " Scan details of the default boot entry's initramfs image.", "====> * scan_dynamic_linker_configuration", " Scan the dynamic linker configuration and find modifications.", "====> * ipa_scanner", " Scan system for ipa-client and ipa-server status", "====> * scan_fips", " Determine whether the source system has FIPS enabled.", "====> * repositories_blacklist", " Exclude target repositories provided by Red Hat without support.", "====> * luks_scanner", " Provides data about active LUKS devices.", "====> * scan_source_kernel", " Scan the source system kernel.", "====> * pci_devices_scanner", " Provides data about existing PCI Devices.", "====> * biosdevname", " Enable biosdevname on the target RHEL system if all interfaces on the source RHEL", "====> * persistentnetnamesdisable", " Disable systemd-udevd persistent network naming on machine with single eth0 NIC", "====> * used_repository_scanner", " Scan used enabled repositories", "====> * selinuxcontentscanner", " Scan the system for any SELinux customizations", "====> * pes_events_scanner", " Provides data about package events from Package Evolution Service.", "====> * setuptargetrepos", " Produces list of repositories that should be available to be used during IPU process.", "==> Processing phase `Checks`", "====> * check_skipped_repositories", " Produces a report if any repositories enabled on the system are going to be skipped.", "====> * crypto_policies_check", " This actor consumes previously gathered information about crypto policies on the source", "====> * check_custom_modifications_actor", " Checks CustomModifications messages and produces a report about files in leapp directories that have been", "====> * check_cifs", " Check if CIFS filesystem is in use. If yes, inhibit the upgrade process.", "====> * sssd_check", " Check SSSD configuration for changes in RHEL10 and report them in model.", "====> * check_fips", " Inhibit upgrade if FIPS is detected as enabled.", "====> * unsupported_upgrade_check", " Checks environment variables and produces a warning report if the upgrade is unsupported.", "====> * check_dynamic_linker_configuration", " Check for customization of dynamic linker configuration.", "====> * cephvolumescan", " Retrieves the list of encrypted Ceph OSD", "====> * check_default_initramfs", " Checks whether the default initramfs uses problematic dracut modules.", "====> * check_etc_releasever", " Check releasever info and provide a guidance based on the facts", "====> * checktargetrepos", " Check whether target yum repositories are specified.", "====> * efi_check_boot", " Adjust EFI boot entry for first reboot", "====> * check_detected_devices_and_drivers", " Checks whether or not detected devices and drivers are usable on the target system.", "====> * check_grub_core", " Check whether we are on legacy (BIOS) system and instruct Leapp to upgrade GRUB core", "====> * check_fstab_mount_order", " Checks order of entries in /etc/fstab based on their mount point and inhibits upgrade if overshadowing is detected.", "====> * check_pam_user_db", " Create report with the location of pam_userdb databases", "====> * checkmemory", " The actor check the size of RAM against RHEL8 minimal hardware requirements", "====> * mysql_check", " Actor checking for output produced by scanmysql actor.", "====> * check_ipa_server", " Check for ipa-server and inhibit upgrade", "====> * check_old_xfs", " Check mounted XFS file systems.", "====> * check_persistent_mounts", " Check if mounts required to be persistent are mounted in persistent fashion.", "====> * check_consumed_assets", " Check whether Leapp is using correct data assets.", "====> * network_deprecations", " Ensures that network configuration doesn't rely on unsupported settings", "====> * check_boot_avail_space", " Check if at least 100Mib of available space on /boot. If not, inhibit the upgrade process.", "====> * check_insights_auto_register", " Checks if system can be automatically registered into Red Hat Insights", "====> * check_microarchitecture", " Inhibit if RHEL9 microarchitecture requirements are not satisfied", "====> * inhibit_cgroupsv1", " Inhibit upgrade if cgroups-v1 are enabled", "====> * check_luks", " Check if any encrypted partitions are in use and whether they are supported for the upgrade.", "====> * libdb_check", " Actor checking for presence of libdb(Berkeley DB) installation.", "====> * check_mount_options", " Check for mount options preventing the upgrade.", "====> * bacula_check", " Actor checking for presence of Bacula installation.", "====> * mariadb_check", " Actor checking for presence of MariaDB installation.", "====> * check_nfs", " Check if NFS filesystem is in use. If yes, inhibit the upgrade process.", "====> * check_rhsmsku", " Ensure the system is subscribed to the subscription manager", "====> * open_ssl_engines_check", " The OpenSSL in RHEL 10 has deprecated engines in favor of providers.", "====> * check_os_release", " Check if the current RHEL minor version is supported. If not, inhibit the upgrade process.", "====> * check_rhsmsca", " Ensure that a registered system is in SCA (Simple Content Access)", "====> * check_se_linux", " Check SELinux status and produce decision messages for further action.", "====> * check_sap_hana", " If SAP HANA has been detected, several checks are performed to ensure a successful upgrade.", "====> * check_root_symlinks", " Check if the symlinks /bin and /lib are relative, not absolute.", "====> * postgresql_check", " Actor checking for presence of PostgreSQL installation.", "====> * check_target_iso", " Check that the provided target ISO is a valid ISO image and is located on a persistent partition.", "====> * check_yum_plugins_enabled", " Checks that the required yum plugins are enabled.", "====> * check_system_arch", " Check if system is running at a supported architecture. If no, inhibit the upgrade process.", "====> * check_installed_kernels", " Inhibit IPU (in-place upgrade) when installed kernels conflict with a safe upgrade.", "====> * check_target_version", " Check that the target system version is supported by the upgrade process.", "====> * detect_grub_config_error", " Check grub configuration for various errors.", "====> * distribution_signed_rpm_check", " Check if there are any packages that are not signed by distribution GPG keys.", "====> * check_grubenv_to_file", " Check whether grubenv is a symlink on Azure hybrid images using BIOS.", "====> * check_systemd_broken_symlinks", " Check whether some systemd symlinks are broken", "====> * check_openssl_conf", " Check whether the openssl configuration and openssl-IBMCA.", "====> * openssh_permit_root_login", " OpenSSH no longer allows root logins with password.", "====> * check_rpm_transaction_events", " Filter RPM transaction events based on installed RPM packages", "====> * check_skip_phase", " Skip all the subsequent phases until the report phase.", "==> Processing phase `Reports`", "====> * verify_check_results", " Check all dialogs and notify that user needs to make some choices.", "====> * verify_check_results", " Check all generated results messages and notify user about them.", "", "Debug output written to /var/log/leapp/leapp-preupgrade.log", "", "============================================================", " REPORT OVERVIEW ", "============================================================", "", "Upgrade has been inhibited due to the following problems:", " 1. Using RHSM has been skipped but no custom or RHUI repositories have been delivered.", " 2. Legacy network configuration found", " 3. Use of NFS detected. Upgrade can't proceed", "", "HIGH and MEDIUM severity reports:", " 1. Upgrade is unsupported", " 2. Leapp detected a processor which is no longer maintained in RHEL 10.", " 3. GRUB2 core will be automatically updated during the upgrade", " 4. Berkeley DB (libdb) has been detected on your system", "", "Reports summary:", " Errors: 0", " Inhibitors: 3", " HIGH severity reports: 3", " MEDIUM severity reports: 1", " LOW severity reports: 1", " INFO severity reports: 2", "", "Before continuing, review the full report below for details about discovered problems and possible remediation instructions:", " A report has been generated at /var/log/leapp/leapp-report.txt", " A report has been generated at /var/log/leapp/leapp-report.json", "", "============================================================", " END OF REPORT OVERVIEW ", "============================================================", "", "Answerfile has been generated at /var/log/leapp/answerfile"]} TASK [infra.leapp.analysis : analysis-leapp | Include check-results-file.yml] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:88 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/check-results-file.yml for managed-node01 TASK [infra.leapp.analysis : check-results-file | Result file status] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/check-results-file.yml:2 ok: [managed-node01] => {"changed": false, "stat": {"atime": 1773063527.4063072, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 16, "charset": "us-ascii", "checksum": "279322fe66376d161614e57fa0d849c60c1d6e3a", "ctime": 1773063527.4073074, "dev": 51716, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 478150822, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1773063527.4073074, "nlink": 1, "path": "/var/log/leapp/leapp-report.txt", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 7196, "uid": 0, "version": "2306891254", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} TASK [infra.leapp.analysis : check-results-file | Check that result file exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/check-results-file.yml:7 ok: [managed-node01] => { "changed": false, "msg": "All assertions passed" } TASK [analysis-leapp | Run parse_leapp_report to check for inhibitors] ********* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:91 TASK [infra.leapp.common : parse_leapp_report | Default upgrade_inhibited to false] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:12 ok: [managed-node01] => {"ansible_facts": {"upgrade_inhibited": false}, "changed": false} TASK [infra.leapp.common : parse_leapp_report | Fail if pre-upgrade analysis was not run] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:17 ok: [managed-node01] => {"changed": false, "failed_when_result": false, "stat": {"atime": 1773063562.17761, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 16, "charset": "us-ascii", "checksum": "279322fe66376d161614e57fa0d849c60c1d6e3a", "ctime": 1773063527.4073074, "dev": 51716, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 478150822, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1773063527.4073074, "nlink": 1, "path": "/var/log/leapp/leapp-report.txt", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 7196, "uid": 0, "version": "2306891254", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} TASK [infra.leapp.common : parse_leapp_report | Collect human readable report results] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:23 ok: [managed-node01] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} TASK [infra.leapp.common : parse_leapp_report | Collect JSON report results] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:29 ok: [managed-node01] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} TASK [infra.leapp.common : parse_leapp_report | Parse report results] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:35 ok: [managed-node01] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} TASK [infra.leapp.common : parse_leapp_report | Clear leapp_inhibitors] ******** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:42 ok: [managed-node01] => {"ansible_facts": {"leapp_inhibitors": []}, "changed": false} TASK [infra.leapp.common : parse_leapp_report | Check for inhibitors] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:46 skipping: [managed-node01] => (item={'audience': 'sysadmin', 'detail': {'remediations': [{'context': 'If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).', 'type': 'hint'}]}, 'groups': ['repository', 'failure'], 'key': '1b9132cb2362ae7830e48eee7811be9527747de8', 'severity': 'info', 'summary': 'The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-for-rhel-10-x86_64-eus-rpms\n- codeready-builder-beta-for-rhel-10-x86_64-rpms\n- rhui-codeready-builder-for-rhel-10-aarch64-rhui-rpms\n- codeready-builder-for-rhel-10-x86_64-rpms\n- codeready-builder-beta-for-rhel-10-ppc64le-rpms\n- codeready-builder-for-rhel-10-aarch64-eus-rpms\n- rhui-codeready-builder-for-rhel-10-x86_64-rhui-rpms\n- codeready-builder-for-rhel-10-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-10-aarch64-rpms\n- codeready-builder-for-rhel-10-s390x-eus-rpms\n- codeready-builder-for-rhel-10-aarch64-rpms\n- codeready-builder-for-rhel-10-ppc64le-rpms\n- codeready-builder-beta-for-rhel-10-s390x-rpms\n- crb\n- codeready-builder-for-rhel-10-rhui-rpms\n- codeready-builder-for-rhel-10-s390x-rpms', 'title': 'Excluded target system repositories', 'timeStamp': '2026-03-09T13:38:41.245415Z', 'hostname': 'managed-node01', 'actor': 'repositories_blacklist', 'id': '9cb8e6c16d82a3cd469cbc743ef6c4a9e4506c7ee875bd0c61daa2a75dcf3f56'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "repositories_blacklist", "audience": "sysadmin", "detail": {"remediations": [{"context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "type": "hint"}]}, "groups": ["repository", "failure"], "hostname": "managed-node01", "id": "9cb8e6c16d82a3cd469cbc743ef6c4a9e4506c7ee875bd0c61daa2a75dcf3f56", "key": "1b9132cb2362ae7830e48eee7811be9527747de8", "severity": "info", "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-for-rhel-10-x86_64-eus-rpms\n- codeready-builder-beta-for-rhel-10-x86_64-rpms\n- rhui-codeready-builder-for-rhel-10-aarch64-rhui-rpms\n- codeready-builder-for-rhel-10-x86_64-rpms\n- codeready-builder-beta-for-rhel-10-ppc64le-rpms\n- codeready-builder-for-rhel-10-aarch64-eus-rpms\n- rhui-codeready-builder-for-rhel-10-x86_64-rhui-rpms\n- codeready-builder-for-rhel-10-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-10-aarch64-rpms\n- codeready-builder-for-rhel-10-s390x-eus-rpms\n- codeready-builder-for-rhel-10-aarch64-rpms\n- codeready-builder-for-rhel-10-ppc64le-rpms\n- codeready-builder-beta-for-rhel-10-s390x-rpms\n- crb\n- codeready-builder-for-rhel-10-rhui-rpms\n- codeready-builder-for-rhel-10-s390x-rpms", "timeStamp": "2026-03-09T13:38:41.245415Z", "title": "Excluded target system repositories"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'audience': 'sysadmin', 'groups': ['upgrade process', 'sanity'], 'key': '9e5088e3c1f371e020ec777c3d86578f4be143cf', 'severity': 'high', 'summary': 'Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.\n', 'title': 'Upgrade is unsupported', 'timeStamp': '2026-03-09T13:38:44.824672Z', 'hostname': 'managed-node01', 'actor': 'unsupported_upgrade_check', 'id': 'db73c3010dc2ea4e1d766f2651ef586825176932f668a7e9be809ef9b96627ae'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "unsupported_upgrade_check", "audience": "sysadmin", "groups": ["upgrade process", "sanity"], "hostname": "managed-node01", "id": "db73c3010dc2ea4e1d766f2651ef586825176932f668a7e9be809ef9b96627ae", "key": "9e5088e3c1f371e020ec777c3d86578f4be143cf", "severity": "high", "summary": "Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.\n", "timeStamp": "2026-03-09T13:38:44.824672Z", "title": "Upgrade is unsupported"}, "skip_reason": "Conditional result was False"} ok: [managed-node01] => (item={'audience': 'sysadmin', 'detail': {'external': [{'title': 'UPGRADING TO RHEL 10', 'url': 'https://red.ht/upgrading-rhel9-to-rhel10-main-official-doc'}], 'related_resources': [{'scheme': 'file', 'title': '/etc/leapp/files/leapp_upgrade_repositories.repo'}], 'remediations': [{'context': 'Create the repository file according to instructions in the referred document on the following path with all repositories that should be used during the upgrade: "/etc/leapp/files/leapp_upgrade_repositories.repo".\n\n', 'type': 'hint'}]}, 'groups': ['sanity', 'inhibitor'], 'key': 'cbf9e2a5e21f047ae0954fb5e0fc0f21b02dcbb0', 'severity': 'high', 'summary': 'Leapp is run in the mode when the Red Hat Subscription Manager is not used (the --no-rhsm option or the LEAPP_NO_RHSM=1 environment variable has been set) so leapp is not able to obtain YUM/DNF repositories with the content for the target system in the standard way. The content has to be delivered either by user manually or, in case of public clouds, by a special Leapp package for RHUI environments.', 'title': 'Using RHSM has been skipped but no custom or RHUI repositories have been delivered.', 'timeStamp': '2026-03-09T13:38:45.104238Z', 'hostname': 'managed-node01', 'actor': 'checktargetrepos', 'id': '0066748f127e715e337c6b149a74be2261eb889e9b752b6dc699573a6ce644cc'}) => {"ansible_facts": {"leapp_inhibitors": [{"actor": "checktargetrepos", "audience": "sysadmin", "detail": {"external": [{"title": "UPGRADING TO RHEL 10", "url": "https://red.ht/upgrading-rhel9-to-rhel10-main-official-doc"}], "related_resources": [{"scheme": "file", "title": "/etc/leapp/files/leapp_upgrade_repositories.repo"}], "remediations": [{"context": "Create the repository file according to instructions in the referred document on the following path with all repositories that should be used during the upgrade: \"/etc/leapp/files/leapp_upgrade_repositories.repo\".\n\n", "type": "hint"}]}, "groups": ["sanity", "inhibitor"], "hostname": "managed-node01", "id": "0066748f127e715e337c6b149a74be2261eb889e9b752b6dc699573a6ce644cc", "key": "cbf9e2a5e21f047ae0954fb5e0fc0f21b02dcbb0", "severity": "high", "summary": "Leapp is run in the mode when the Red Hat Subscription Manager is not used (the --no-rhsm option or the LEAPP_NO_RHSM=1 environment variable has been set) so leapp is not able to obtain YUM/DNF repositories with the content for the target system in the standard way. The content has to be delivered either by user manually or, in case of public clouds, by a special Leapp package for RHUI environments.", "timeStamp": "2026-03-09T13:38:45.104238Z", "title": "Using RHSM has been skipped but no custom or RHUI repositories have been delivered."}], "upgrade_inhibited": true}, "ansible_loop_var": "item", "changed": false, "item": {"actor": "checktargetrepos", "audience": "sysadmin", "detail": {"external": [{"title": "UPGRADING TO RHEL 10", "url": "https://red.ht/upgrading-rhel9-to-rhel10-main-official-doc"}], "related_resources": [{"scheme": "file", "title": "/etc/leapp/files/leapp_upgrade_repositories.repo"}], "remediations": [{"context": "Create the repository file according to instructions in the referred document on the following path with all repositories that should be used during the upgrade: \"/etc/leapp/files/leapp_upgrade_repositories.repo\".\n\n", "type": "hint"}]}, "groups": ["sanity", "inhibitor"], "hostname": "managed-node01", "id": "0066748f127e715e337c6b149a74be2261eb889e9b752b6dc699573a6ce644cc", "key": "cbf9e2a5e21f047ae0954fb5e0fc0f21b02dcbb0", "severity": "high", "summary": "Leapp is run in the mode when the Red Hat Subscription Manager is not used (the --no-rhsm option or the LEAPP_NO_RHSM=1 environment variable has been set) so leapp is not able to obtain YUM/DNF repositories with the content for the target system in the standard way. The content has to be delivered either by user manually or, in case of public clouds, by a special Leapp package for RHUI environments.", "timeStamp": "2026-03-09T13:38:45.104238Z", "title": "Using RHSM has been skipped but no custom or RHUI repositories have been delivered."}} skipping: [managed-node01] => (item={'audience': 'sysadmin', 'groups': ['kernel', 'boot'], 'key': '9dde4bcd8b458bd6803462216785df3a1476c1f8', 'severity': 'high', 'summary': 'The following processors are no longer maintained in RHEL 10:\n - HASWELL_X\n', 'title': 'Leapp detected a processor which is no longer maintained in RHEL 10.', 'timeStamp': '2026-03-09T13:38:45.193399Z', 'hostname': 'managed-node01', 'actor': 'check_detected_devices_and_drivers', 'id': 'be4f7399c12e089657f440109bd40d71a856500520210fd68f2b96add2f9ec3c'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "groups": ["kernel", "boot"], "hostname": "managed-node01", "id": "be4f7399c12e089657f440109bd40d71a856500520210fd68f2b96add2f9ec3c", "key": "9dde4bcd8b458bd6803462216785df3a1476c1f8", "severity": "high", "summary": "The following processors are no longer maintained in RHEL 10:\n - HASWELL_X\n", "timeStamp": "2026-03-09T13:38:45.193399Z", "title": "Leapp detected a processor which is no longer maintained in RHEL 10."}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'audience': 'sysadmin', 'groups': ['boot'], 'key': 'ac7030e05d2ee248d34f08a9fa040b352bc410a3', 'severity': 'high', 'summary': 'On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running "grub2-install" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.', 'title': 'GRUB2 core will be automatically updated during the upgrade', 'timeStamp': '2026-03-09T13:38:45.237044Z', 'hostname': 'managed-node01', 'actor': 'check_grub_core', 'id': 'b82155dd6d95a09fabb20479de464f62a31c8340ef3f775fdde1e8cf9ed6f257'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_grub_core", "audience": "sysadmin", "groups": ["boot"], "hostname": "managed-node01", "id": "b82155dd6d95a09fabb20479de464f62a31c8340ef3f775fdde1e8cf9ed6f257", "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", "severity": "high", "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", "timeStamp": "2026-03-09T13:38:45.237044Z", "title": "GRUB2 core will be automatically updated during the upgrade"}, "skip_reason": "Conditional result was False"} ok: [managed-node01] => (item={'audience': 'sysadmin', 'detail': {'external': [{'title': 'How to migrate the connection from ifcfg to NetworkManager keyfile plugin?', 'url': 'https://access.redhat.com/solutions/7083803'}, {'title': 'nmcli(1) manual, describes "connection migrate" sub-command.', 'url': 'https://networkmanager.dev/docs/api/latest/nmcli.html'}, {'title': 'nm-settings-ifcfg-rh(5), description of the "ifcfg" format', 'url': 'https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html'}, {'title': 'nm-settings-keyfile(5), description of the "keyfile" format', 'url': 'https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html'}], 'related_resources': [{'scheme': 'package', 'title': 'NetworkManager'}, {'scheme': 'file', 'title': '/etc/sysconfig/network-scripts/ifcfg-eth0'}], 'remediations': [{'context': 'Convert the configuration into NetworkManager native "keyfile" format.', 'type': 'hint'}, {'context': ['nmcli', 'connection', 'migrate', '/etc/sysconfig/network-scripts/ifcfg-eth0'], 'type': 'command'}]}, 'groups': ['network', 'services', 'inhibitor'], 'key': '7de70b43c3c9d20075e30894ac24a4c4e2d70837', 'severity': 'high', 'summary': 'Network configuration files in legacy "ifcfg" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:\n - /etc/sysconfig/network-scripts/ifcfg-eth0', 'title': 'Legacy network configuration found', 'timeStamp': '2026-03-09T13:38:45.625723Z', 'hostname': 'managed-node01', 'actor': 'network_deprecations', 'id': '7fbf2b52543e22008a19bd665bb5ede6d799e98b8c558cc1f3d065d5d6f7385a'}) => {"ansible_facts": {"leapp_inhibitors": [{"actor": "checktargetrepos", "audience": "sysadmin", "detail": {"external": [{"title": "UPGRADING TO RHEL 10", "url": "https://red.ht/upgrading-rhel9-to-rhel10-main-official-doc"}], "related_resources": [{"scheme": "file", "title": "/etc/leapp/files/leapp_upgrade_repositories.repo"}], "remediations": [{"context": "Create the repository file according to instructions in the referred document on the following path with all repositories that should be used during the upgrade: \"/etc/leapp/files/leapp_upgrade_repositories.repo\".\n\n", "type": "hint"}]}, "groups": ["sanity", "inhibitor"], "hostname": "managed-node01", "id": "0066748f127e715e337c6b149a74be2261eb889e9b752b6dc699573a6ce644cc", "key": "cbf9e2a5e21f047ae0954fb5e0fc0f21b02dcbb0", "severity": "high", "summary": "Leapp is run in the mode when the Red Hat Subscription Manager is not used (the --no-rhsm option or the LEAPP_NO_RHSM=1 environment variable has been set) so leapp is not able to obtain YUM/DNF repositories with the content for the target system in the standard way. The content has to be delivered either by user manually or, in case of public clouds, by a special Leapp package for RHUI environments.", "timeStamp": "2026-03-09T13:38:45.104238Z", "title": "Using RHSM has been skipped but no custom or RHUI repositories have been delivered."}, {"actor": "network_deprecations", "audience": "sysadmin", "detail": {"external": [{"title": "How to migrate the connection from ifcfg to NetworkManager keyfile plugin?", "url": "https://access.redhat.com/solutions/7083803"}, {"title": "nmcli(1) manual, describes \"connection migrate\" sub-command.", "url": "https://networkmanager.dev/docs/api/latest/nmcli.html"}, {"title": "nm-settings-ifcfg-rh(5), description of the \"ifcfg\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html"}, {"title": "nm-settings-keyfile(5), description of the \"keyfile\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html"}], "related_resources": [{"scheme": "package", "title": "NetworkManager"}, {"scheme": "file", "title": "/etc/sysconfig/network-scripts/ifcfg-eth0"}], "remediations": [{"context": "Convert the configuration into NetworkManager native \"keyfile\" format.", "type": "hint"}, {"context": ["nmcli", "connection", "migrate", "/etc/sysconfig/network-scripts/ifcfg-eth0"], "type": "command"}]}, "groups": ["network", "services", "inhibitor"], "hostname": "managed-node01", "id": "7fbf2b52543e22008a19bd665bb5ede6d799e98b8c558cc1f3d065d5d6f7385a", "key": "7de70b43c3c9d20075e30894ac24a4c4e2d70837", "severity": "high", "summary": "Network configuration files in legacy \"ifcfg\" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:\n - /etc/sysconfig/network-scripts/ifcfg-eth0", "timeStamp": "2026-03-09T13:38:45.625723Z", "title": "Legacy network configuration found"}], "upgrade_inhibited": true}, "ansible_loop_var": "item", "changed": false, "item": {"actor": "network_deprecations", "audience": "sysadmin", "detail": {"external": [{"title": "How to migrate the connection from ifcfg to NetworkManager keyfile plugin?", "url": "https://access.redhat.com/solutions/7083803"}, {"title": "nmcli(1) manual, describes \"connection migrate\" sub-command.", "url": "https://networkmanager.dev/docs/api/latest/nmcli.html"}, {"title": "nm-settings-ifcfg-rh(5), description of the \"ifcfg\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html"}, {"title": "nm-settings-keyfile(5), description of the \"keyfile\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html"}], "related_resources": [{"scheme": "package", "title": "NetworkManager"}, {"scheme": "file", "title": "/etc/sysconfig/network-scripts/ifcfg-eth0"}], "remediations": [{"context": "Convert the configuration into NetworkManager native \"keyfile\" format.", "type": "hint"}, {"context": ["nmcli", "connection", "migrate", "/etc/sysconfig/network-scripts/ifcfg-eth0"], "type": "command"}]}, "groups": ["network", "services", "inhibitor"], "hostname": "managed-node01", "id": "7fbf2b52543e22008a19bd665bb5ede6d799e98b8c558cc1f3d065d5d6f7385a", "key": "7de70b43c3c9d20075e30894ac24a4c4e2d70837", "severity": "high", "summary": "Network configuration files in legacy \"ifcfg\" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:\n - /etc/sysconfig/network-scripts/ifcfg-eth0", "timeStamp": "2026-03-09T13:38:45.625723Z", "title": "Legacy network configuration found"}} skipping: [managed-node01] => (item={'audience': 'sysadmin', 'detail': {'external': [{'title': 'Migrating to a RHEL 10 without libdb', 'url': 'https://access.redhat.com/articles/7099256'}], 'related_resources': [{'scheme': 'package', 'title': 'libdb'}], 'remediations': [{'context': 'Back up your data before proceeding with the data upgrade/migration. For the conversion, the tool db_converter from the libdb-utils rpm could be used. This database format conversion must be performed before the system upgrade. The db_converter is not available in RHEL 10 systems. For more information, see the provided article.', 'type': 'hint'}]}, 'groups': ['services'], 'key': 'fdc8f5b084e95922a4f59485a807a92cae2fc738', 'severity': 'medium', 'summary': 'Libdb was marked as deprecated in RHEL-9 and in RHEL-10 is not included anymore. There are a couple of alternatives in RHEL-10; the applications that depend on libdb will not work. Such applications must implement another type of backend storage. And migrate existing data to the new database format.', 'title': 'Berkeley DB (libdb) has been detected on your system', 'timeStamp': '2026-03-09T13:38:45.975373Z', 'hostname': 'managed-node01', 'actor': 'libdb_check', 'id': 'acfcb4b97db969e75089abacb95a6aab9750d4195dda01f356b1c1157413811f'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "libdb_check", "audience": "sysadmin", "detail": {"external": [{"title": "Migrating to a RHEL 10 without libdb", "url": "https://access.redhat.com/articles/7099256"}], "related_resources": [{"scheme": "package", "title": "libdb"}], "remediations": [{"context": "Back up your data before proceeding with the data upgrade/migration. For the conversion, the tool db_converter from the libdb-utils rpm could be used. This database format conversion must be performed before the system upgrade. The db_converter is not available in RHEL 10 systems. For more information, see the provided article.", "type": "hint"}]}, "groups": ["services"], "hostname": "managed-node01", "id": "acfcb4b97db969e75089abacb95a6aab9750d4195dda01f356b1c1157413811f", "key": "fdc8f5b084e95922a4f59485a807a92cae2fc738", "severity": "medium", "summary": "Libdb was marked as deprecated in RHEL-9 and in RHEL-10 is not included anymore. There are a couple of alternatives in RHEL-10; the applications that depend on libdb will not work. Such applications must implement another type of backend storage. And migrate existing data to the new database format.", "timeStamp": "2026-03-09T13:38:45.975373Z", "title": "Berkeley DB (libdb) has been detected on your system"}, "skip_reason": "Conditional result was False"} ok: [managed-node01] => (item={'audience': 'sysadmin', 'detail': {'external': [{'title': 'Why does leapp upgrade fail on detecting NFS during upgrade?', 'url': 'https://access.redhat.com/solutions/6964006'}], 'related_resources': [{'scheme': 'file', 'title': '/etc/fstab'}], 'remediations': [{'context': 'Disable NFS temporarily for the upgrade if possible.', 'type': 'hint'}]}, 'groups': ['filesystem', 'network', 'inhibitor'], 'key': '9881b25faceeeaa7a6478bcdac29afd7f6baaaed', 'severity': 'high', 'summary': 'NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n', 'title': "Use of NFS detected. Upgrade can't proceed", 'timeStamp': '2026-03-09T13:38:46.194322Z', 'hostname': 'managed-node01', 'actor': 'check_nfs', 'id': '91d9e908ec48d8e7289df5d1f2b9e5fe085cd4896e7d4b165885717761e87101'}) => {"ansible_facts": {"leapp_inhibitors": [{"actor": "checktargetrepos", "audience": "sysadmin", "detail": {"external": [{"title": "UPGRADING TO RHEL 10", "url": "https://red.ht/upgrading-rhel9-to-rhel10-main-official-doc"}], "related_resources": [{"scheme": "file", "title": "/etc/leapp/files/leapp_upgrade_repositories.repo"}], "remediations": [{"context": "Create the repository file according to instructions in the referred document on the following path with all repositories that should be used during the upgrade: \"/etc/leapp/files/leapp_upgrade_repositories.repo\".\n\n", "type": "hint"}]}, "groups": ["sanity", "inhibitor"], "hostname": "managed-node01", "id": "0066748f127e715e337c6b149a74be2261eb889e9b752b6dc699573a6ce644cc", "key": "cbf9e2a5e21f047ae0954fb5e0fc0f21b02dcbb0", "severity": "high", "summary": "Leapp is run in the mode when the Red Hat Subscription Manager is not used (the --no-rhsm option or the LEAPP_NO_RHSM=1 environment variable has been set) so leapp is not able to obtain YUM/DNF repositories with the content for the target system in the standard way. The content has to be delivered either by user manually or, in case of public clouds, by a special Leapp package for RHUI environments.", "timeStamp": "2026-03-09T13:38:45.104238Z", "title": "Using RHSM has been skipped but no custom or RHUI repositories have been delivered."}, {"actor": "network_deprecations", "audience": "sysadmin", "detail": {"external": [{"title": "How to migrate the connection from ifcfg to NetworkManager keyfile plugin?", "url": "https://access.redhat.com/solutions/7083803"}, {"title": "nmcli(1) manual, describes \"connection migrate\" sub-command.", "url": "https://networkmanager.dev/docs/api/latest/nmcli.html"}, {"title": "nm-settings-ifcfg-rh(5), description of the \"ifcfg\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html"}, {"title": "nm-settings-keyfile(5), description of the \"keyfile\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html"}], "related_resources": [{"scheme": "package", "title": "NetworkManager"}, {"scheme": "file", "title": "/etc/sysconfig/network-scripts/ifcfg-eth0"}], "remediations": [{"context": "Convert the configuration into NetworkManager native \"keyfile\" format.", "type": "hint"}, {"context": ["nmcli", "connection", "migrate", "/etc/sysconfig/network-scripts/ifcfg-eth0"], "type": "command"}]}, "groups": ["network", "services", "inhibitor"], "hostname": "managed-node01", "id": "7fbf2b52543e22008a19bd665bb5ede6d799e98b8c558cc1f3d065d5d6f7385a", "key": "7de70b43c3c9d20075e30894ac24a4c4e2d70837", "severity": "high", "summary": "Network configuration files in legacy \"ifcfg\" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:\n - /etc/sysconfig/network-scripts/ifcfg-eth0", "timeStamp": "2026-03-09T13:38:45.625723Z", "title": "Legacy network configuration found"}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "91d9e908ec48d8e7289df5d1f2b9e5fe085cd4896e7d4b165885717761e87101", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n", "timeStamp": "2026-03-09T13:38:46.194322Z", "title": "Use of NFS detected. Upgrade can't proceed"}], "upgrade_inhibited": true}, "ansible_loop_var": "item", "changed": false, "item": {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "91d9e908ec48d8e7289df5d1f2b9e5fe085cd4896e7d4b165885717761e87101", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n", "timeStamp": "2026-03-09T13:38:46.194322Z", "title": "Use of NFS detected. Upgrade can't proceed"}} skipping: [managed-node01] => (item={'audience': 'sysadmin', 'groups': ['selinux', 'security'], 'key': '8fb81863f8413bd617c2a55b69b8e10ff03d7c72', 'severity': 'info', 'summary': 'SElinux relabeling will be scheduled as the status is permissive/enforcing.', 'title': 'SElinux relabeling will be scheduled', 'timeStamp': '2026-03-09T13:38:46.471807Z', 'hostname': 'managed-node01', 'actor': 'check_se_linux', 'id': '386047b8143b737cf6dfaaee5a0b691b3c684d8f1da2d7b9c2809abc70043db4'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_se_linux", "audience": "sysadmin", "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "386047b8143b737cf6dfaaee5a0b691b3c684d8f1da2d7b9c2809abc70043db4", "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", "severity": "info", "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", "timeStamp": "2026-03-09T13:38:46.471807Z", "title": "SElinux relabeling will be scheduled"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'audience': 'sysadmin', 'detail': {'remediations': [{'context': 'Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the "/root/tmp_leapp_py3" SElinux warnings.', 'type': 'hint'}]}, 'groups': ['selinux', 'security'], 'key': '39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f', 'severity': 'low', 'summary': 'SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.', 'title': 'SElinux will be set to permissive mode', 'timeStamp': '2026-03-09T13:38:46.474387Z', 'hostname': 'managed-node01', 'actor': 'check_se_linux', 'id': '0b88df8bfd0adf2aeefced6dfec74257a9b9ef7ddbff67838962c80a819cb3d0'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_se_linux", "audience": "sysadmin", "detail": {"remediations": [{"context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.", "type": "hint"}]}, "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "0b88df8bfd0adf2aeefced6dfec74257a9b9ef7ddbff67838962c80a819cb3d0", "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", "severity": "low", "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", "timeStamp": "2026-03-09T13:38:46.474387Z", "title": "SElinux will be set to permissive mode"}, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : parse_leapp_report | Collect inhibitors] ************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:58 ok: [managed-node01] => {"changed": false, "cmd": ["awk", "/\\(inhibitor\\)/,/^-------/", "/var/log/leapp/leapp-report.txt"], "delta": "0:00:00.004447", "end": "2026-03-09 09:39:24.106265", "failed_when_result": false, "msg": "", "rc": 0, "start": "2026-03-09 09:39:24.101818", "stderr": "", "stderr_lines": [], "stdout": "Risk Factor: high (inhibitor)\nTitle: Using RHSM has been skipped but no custom or RHUI repositories have been delivered.\nSummary: Leapp is run in the mode when the Red Hat Subscription Manager is not used (the --no-rhsm option or the LEAPP_NO_RHSM=1 environment variable has been set) so leapp is not able to obtain YUM/DNF repositories with the content for the target system in the standard way. The content has to be delivered either by user manually or, in case of public clouds, by a special Leapp package for RHUI environments.\nRelated links:\n - UPGRADING TO RHEL 10: https://red.ht/upgrading-rhel9-to-rhel10-main-official-doc\nRemediation: [hint] Create the repository file according to instructions in the referred document on the following path with all repositories that should be used during the upgrade: \"/etc/leapp/files/leapp_upgrade_repositories.repo\".\n\n\nKey: cbf9e2a5e21f047ae0954fb5e0fc0f21b02dcbb0\n----------------------------------------\nRisk Factor: high (inhibitor)\nTitle: Legacy network configuration found\nSummary: Network configuration files in legacy \"ifcfg\" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:\n - /etc/sysconfig/network-scripts/ifcfg-eth0\nRelated links:\n - How to migrate the connection from ifcfg to NetworkManager keyfile plugin?: https://access.redhat.com/solutions/7083803\n - nmcli(1) manual, describes \"connection migrate\" sub-command.: https://networkmanager.dev/docs/api/latest/nmcli.html\n - nm-settings-ifcfg-rh(5), description of the \"ifcfg\" format: https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html\n - nm-settings-keyfile(5), description of the \"keyfile\" format: https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html\nRemediation: [hint] Convert the configuration into NetworkManager native \"keyfile\" format.\n[command] nmcli connection migrate /etc/sysconfig/network-scripts/ifcfg-eth0\nKey: 7de70b43c3c9d20075e30894ac24a4c4e2d70837\n----------------------------------------\nRisk Factor: high (inhibitor)\nTitle: Use of NFS detected. Upgrade can't proceed\nSummary: NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n\nRelated links:\n - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006\nRemediation: [hint] Disable NFS temporarily for the upgrade if possible.\nKey: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed\n----------------------------------------", "stdout_lines": ["Risk Factor: high (inhibitor)", "Title: Using RHSM has been skipped but no custom or RHUI repositories have been delivered.", "Summary: Leapp is run in the mode when the Red Hat Subscription Manager is not used (the --no-rhsm option or the LEAPP_NO_RHSM=1 environment variable has been set) so leapp is not able to obtain YUM/DNF repositories with the content for the target system in the standard way. The content has to be delivered either by user manually or, in case of public clouds, by a special Leapp package for RHUI environments.", "Related links:", " - UPGRADING TO RHEL 10: https://red.ht/upgrading-rhel9-to-rhel10-main-official-doc", "Remediation: [hint] Create the repository file according to instructions in the referred document on the following path with all repositories that should be used during the upgrade: \"/etc/leapp/files/leapp_upgrade_repositories.repo\".", "", "", "Key: cbf9e2a5e21f047ae0954fb5e0fc0f21b02dcbb0", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Legacy network configuration found", "Summary: Network configuration files in legacy \"ifcfg\" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:", " - /etc/sysconfig/network-scripts/ifcfg-eth0", "Related links:", " - How to migrate the connection from ifcfg to NetworkManager keyfile plugin?: https://access.redhat.com/solutions/7083803", " - nmcli(1) manual, describes \"connection migrate\" sub-command.: https://networkmanager.dev/docs/api/latest/nmcli.html", " - nm-settings-ifcfg-rh(5), description of the \"ifcfg\" format: https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html", " - nm-settings-keyfile(5), description of the \"keyfile\" format: https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html", "Remediation: [hint] Convert the configuration into NetworkManager native \"keyfile\" format.", "[command] nmcli connection migrate /etc/sysconfig/network-scripts/ifcfg-eth0", "Key: 7de70b43c3c9d20075e30894ac24a4c4e2d70837", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Use of NFS detected. Upgrade can't proceed", "Summary: NFS is currently not supported by the inplace upgrade.", "We have found NFS usage at the following locations:", "- NFS shares found in /etc/fstab:", " - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat", " - nest.test.redhat.com:/mnt/qa /mnt/qa", " - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive", " - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist", " - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew", " - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch", "", "Related links:", " - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006", "Remediation: [hint] Disable NFS temporarily for the upgrade if possible.", "Key: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "----------------------------------------"]} TASK [infra.leapp.common : parse_leapp_report | Collect high errors] *********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:67 ok: [managed-node01] => {"changed": false, "cmd": ["awk", "/high \\(error\\)/,/^-------/", "/var/log/leapp/leapp-report.txt"], "delta": "0:00:00.004342", "end": "2026-03-09 09:39:24.486070", "failed_when_result": false, "msg": "", "rc": 0, "start": "2026-03-09 09:39:24.481728", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} TASK [infra.leapp.analysis : analysis-leapp | Create remediation hostvars] ***** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:96 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/create_remediation_hostvars.yml for managed-node01 TASK [infra.leapp.analysis : create_remediation_hostvars | Clear remediation_todo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/create_remediation_hostvars.yml:2 ok: [managed-node01] => {"ansible_facts": {"leapp_remediation_todo": []}, "changed": false} TASK [infra.leapp.analysis : create_remediation_hostvars | Map inhibitors to remediation_todo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/create_remediation_hostvars.yml:6 skipping: [managed-node01] => (item={'audience': 'sysadmin', 'detail': {'external': [{'title': 'UPGRADING TO RHEL 10', 'url': 'https://red.ht/upgrading-rhel9-to-rhel10-main-official-doc'}], 'related_resources': [{'scheme': 'file', 'title': '/etc/leapp/files/leapp_upgrade_repositories.repo'}], 'remediations': [{'context': 'Create the repository file according to instructions in the referred document on the following path with all repositories that should be used during the upgrade: "/etc/leapp/files/leapp_upgrade_repositories.repo".\n\n', 'type': 'hint'}]}, 'groups': ['sanity', 'inhibitor'], 'key': 'cbf9e2a5e21f047ae0954fb5e0fc0f21b02dcbb0', 'severity': 'high', 'summary': 'Leapp is run in the mode when the Red Hat Subscription Manager is not used (the --no-rhsm option or the LEAPP_NO_RHSM=1 environment variable has been set) so leapp is not able to obtain YUM/DNF repositories with the content for the target system in the standard way. The content has to be delivered either by user manually or, in case of public clouds, by a special Leapp package for RHUI environments.', 'title': 'Using RHSM has been skipped but no custom or RHUI repositories have been delivered.', 'timeStamp': '2026-03-09T13:38:45.104238Z', 'hostname': 'managed-node01', 'actor': 'checktargetrepos', 'id': '0066748f127e715e337c6b149a74be2261eb889e9b752b6dc699573a6ce644cc'}) => {"ansible_loop_var": "inhibitor", "changed": false, "inhibitor": {"actor": "checktargetrepos", "audience": "sysadmin", "detail": {"external": [{"title": "UPGRADING TO RHEL 10", "url": "https://red.ht/upgrading-rhel9-to-rhel10-main-official-doc"}], "related_resources": [{"scheme": "file", "title": "/etc/leapp/files/leapp_upgrade_repositories.repo"}], "remediations": [{"context": "Create the repository file according to instructions in the referred document on the following path with all repositories that should be used during the upgrade: \"/etc/leapp/files/leapp_upgrade_repositories.repo\".\n\n", "type": "hint"}]}, "groups": ["sanity", "inhibitor"], "hostname": "managed-node01", "id": "0066748f127e715e337c6b149a74be2261eb889e9b752b6dc699573a6ce644cc", "key": "cbf9e2a5e21f047ae0954fb5e0fc0f21b02dcbb0", "severity": "high", "summary": "Leapp is run in the mode when the Red Hat Subscription Manager is not used (the --no-rhsm option or the LEAPP_NO_RHSM=1 environment variable has been set) so leapp is not able to obtain YUM/DNF repositories with the content for the target system in the standard way. The content has to be delivered either by user manually or, in case of public clouds, by a special Leapp package for RHUI environments.", "timeStamp": "2026-03-09T13:38:45.104238Z", "title": "Using RHSM has been skipped but no custom or RHUI repositories have been delivered."}, "skip_reason": "Conditional result was False"} ok: [managed-node01] => (item={'audience': 'sysadmin', 'detail': {'external': [{'title': 'How to migrate the connection from ifcfg to NetworkManager keyfile plugin?', 'url': 'https://access.redhat.com/solutions/7083803'}, {'title': 'nmcli(1) manual, describes "connection migrate" sub-command.', 'url': 'https://networkmanager.dev/docs/api/latest/nmcli.html'}, {'title': 'nm-settings-ifcfg-rh(5), description of the "ifcfg" format', 'url': 'https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html'}, {'title': 'nm-settings-keyfile(5), description of the "keyfile" format', 'url': 'https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html'}], 'related_resources': [{'scheme': 'package', 'title': 'NetworkManager'}, {'scheme': 'file', 'title': '/etc/sysconfig/network-scripts/ifcfg-eth0'}], 'remediations': [{'context': 'Convert the configuration into NetworkManager native "keyfile" format.', 'type': 'hint'}, {'context': ['nmcli', 'connection', 'migrate', '/etc/sysconfig/network-scripts/ifcfg-eth0'], 'type': 'command'}]}, 'groups': ['network', 'services', 'inhibitor'], 'key': '7de70b43c3c9d20075e30894ac24a4c4e2d70837', 'severity': 'high', 'summary': 'Network configuration files in legacy "ifcfg" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:\n - /etc/sysconfig/network-scripts/ifcfg-eth0', 'title': 'Legacy network configuration found', 'timeStamp': '2026-03-09T13:38:45.625723Z', 'hostname': 'managed-node01', 'actor': 'network_deprecations', 'id': '7fbf2b52543e22008a19bd665bb5ede6d799e98b8c558cc1f3d065d5d6f7385a'}) => {"ansible_facts": {"leapp_remediation_todo": ["leapp_legacy_network_configuration"]}, "ansible_loop_var": "inhibitor", "changed": false, "inhibitor": {"actor": "network_deprecations", "audience": "sysadmin", "detail": {"external": [{"title": "How to migrate the connection from ifcfg to NetworkManager keyfile plugin?", "url": "https://access.redhat.com/solutions/7083803"}, {"title": "nmcli(1) manual, describes \"connection migrate\" sub-command.", "url": "https://networkmanager.dev/docs/api/latest/nmcli.html"}, {"title": "nm-settings-ifcfg-rh(5), description of the \"ifcfg\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html"}, {"title": "nm-settings-keyfile(5), description of the \"keyfile\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html"}], "related_resources": [{"scheme": "package", "title": "NetworkManager"}, {"scheme": "file", "title": "/etc/sysconfig/network-scripts/ifcfg-eth0"}], "remediations": [{"context": "Convert the configuration into NetworkManager native \"keyfile\" format.", "type": "hint"}, {"context": ["nmcli", "connection", "migrate", "/etc/sysconfig/network-scripts/ifcfg-eth0"], "type": "command"}]}, "groups": ["network", "services", "inhibitor"], "hostname": "managed-node01", "id": "7fbf2b52543e22008a19bd665bb5ede6d799e98b8c558cc1f3d065d5d6f7385a", "key": "7de70b43c3c9d20075e30894ac24a4c4e2d70837", "severity": "high", "summary": "Network configuration files in legacy \"ifcfg\" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:\n - /etc/sysconfig/network-scripts/ifcfg-eth0", "timeStamp": "2026-03-09T13:38:45.625723Z", "title": "Legacy network configuration found"}} ok: [managed-node01] => (item={'audience': 'sysadmin', 'detail': {'external': [{'title': 'Why does leapp upgrade fail on detecting NFS during upgrade?', 'url': 'https://access.redhat.com/solutions/6964006'}], 'related_resources': [{'scheme': 'file', 'title': '/etc/fstab'}], 'remediations': [{'context': 'Disable NFS temporarily for the upgrade if possible.', 'type': 'hint'}]}, 'groups': ['filesystem', 'network', 'inhibitor'], 'key': '9881b25faceeeaa7a6478bcdac29afd7f6baaaed', 'severity': 'high', 'summary': 'NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n', 'title': "Use of NFS detected. Upgrade can't proceed", 'timeStamp': '2026-03-09T13:38:46.194322Z', 'hostname': 'managed-node01', 'actor': 'check_nfs', 'id': '91d9e908ec48d8e7289df5d1f2b9e5fe085cd4896e7d4b165885717761e87101'}) => {"ansible_facts": {"leapp_remediation_todo": ["leapp_legacy_network_configuration", "leapp_nfs_detected"]}, "ansible_loop_var": "inhibitor", "changed": false, "inhibitor": {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "91d9e908ec48d8e7289df5d1f2b9e5fe085cd4896e7d4b165885717761e87101", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n", "timeStamp": "2026-03-09T13:38:46.194322Z", "title": "Use of NFS detected. Upgrade can't proceed"}} TASK [infra.leapp.analysis : create_remediation_hostvars | Ensure host_vars directory exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/create_remediation_hostvars.yml:33 ok: [managed-node01 -> localhost] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/tmp/workdir_controllergjd6ffrh/host_vars", "secontext": "unconfined_u:object_r:user_tmp_t:s0", "size": 32, "state": "directory", "uid": 0} TASK [infra.leapp.analysis : create_remediation_hostvars | Check if host_vars file exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/create_remediation_hostvars.yml:39 ok: [managed-node01 -> localhost] => {"changed": false, "stat": {"atime": 1773063489.1372964, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "165076eb6b9fac25e39014723e3cdb9b570bce81", "ctime": 1773063488.358295, "dev": 51716, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 511705250, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0600", "mtime": 1773063487.6132936, "nlink": 1, "path": "/tmp/workdir_controllergjd6ffrh/host_vars/managed-node01.yml", "pw_name": "root", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 221, "uid": 0, "version": "230984665", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} TASK [infra.leapp.analysis : create_remediation_hostvars | Read existing host_vars file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/create_remediation_hostvars.yml:44 ok: [managed-node01 -> localhost] => {"changed": false, "content": "LS0tCmxlYXBwX3N0cmluZ192YXJpYWJsZTogInRlc3QgdmFsdWUiCmxlYXBwX2RpY3RfdmFyaWFibGU6CiAga2V5MTogdmFsdWUxCiAga2V5MjogdmFsdWUyCmxlYXBwX2xpc3RfdmFyaWFibGU6CiAgLSB2YWx1ZTEKICAtIHZhbHVlMgogIC0gdmFsdWUzCmxlYXBwX2ludF92YXJpYWJsZTogMTIzCmxlYXBwX2Jvb2xfdmFyaWFibGU6IHRydWUKbGVhcHBfbnVsbF92YXJpYWJsZTogbnVsbAo=", "encoding": "base64", "source": "/tmp/workdir_controllergjd6ffrh/host_vars/managed-node01.yml"} TASK [infra.leapp.analysis : create_remediation_hostvars | Write host_vars file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/create_remediation_hostvars.yml:50 changed: [managed-node01 -> localhost] => {"changed": true, "checksum": "68d62b3f34f5516a3d2339d2488a47ae6727b494", "dest": "/tmp/workdir_controllergjd6ffrh/host_vars/managed-node01.yml", "gid": 0, "group": "root", "md5sum": "243930173dc2d55daa8d22e20e962ccb", "mode": "0644", "owner": "root", "secontext": "unconfined_u:object_r:admin_home_t:s0", "size": 304, "src": "/root/.ansible/tmp/ansible-tmp-1773063565.5209584-11209-137641472441000/source", "state": "file", "uid": 0} TASK [infra.leapp.analysis : create_remediation_hostvars | Create remediation playbook file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/create_remediation_hostvars.yml:67 changed: [managed-node01 -> localhost] => {"changed": true, "checksum": "21b4da105a7b833931acbb2b42302d79170758e0", "dest": "/tmp/workdir_controllergjd6ffrh/remediate.yml", "gid": 0, "group": "root", "md5sum": "aac94f56d084baed245cfcde9af4c23f", "mode": "0644", "owner": "root", "secontext": "unconfined_u:object_r:admin_home_t:s0", "size": 182, "src": "/root/.ansible/tmp/ansible-tmp-1773063565.9588444-11233-175563896451104/source", "state": "file", "uid": 0} TASK [analysis-leapp | Include custom_local_repos for local_repos_post_analysis] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:101 TASK [infra.leapp.common : custom_local_repos | Remove old /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:2 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : custom_local_repos | Validate repo definitions have baseurl or metalink] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:9 skipping: [managed-node01] => {"changed": false, "skipped_reason": "No items in the list"} TASK [infra.leapp.common : custom_local_repos | Enable custom upgrade yum repositories] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:16 skipping: [managed-node01] => {"changed": false, "skipped_reason": "No items in the list"} TASK [analysis-leapp | Restore original Satellite activation key] ************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:111 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [analysis-leapp | Copy reports to the controller] ************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:122 TASK [infra.leapp.common : copy_reports_to_controller | Ensure reports directory on controller] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/copy_reports_to_controller.yml:20 changed: [managed-node01 -> localhost] => {"changed": true, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/tmp/workdir_controllergjd6ffrh/ansible_leapp_analysis_logs_2026-03-09_13-38-09", "secontext": "unconfined_u:object_r:user_tmp_t:s0", "size": 6, "state": "directory", "uid": 0} TASK [infra.leapp.common : copy_reports_to_controller | Fetch report files if they exist] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/copy_reports_to_controller.yml:30 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/fetch_file_if_exists.yml for managed-node01 => (item=/var/log/leapp/leapp-report.txt) included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/fetch_file_if_exists.yml for managed-node01 => (item=/var/log/leapp/leapp-report.json) included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/fetch_file_if_exists.yml for managed-node01 => (item=/var/log/leapp/leapp-preupgrade.log) TASK [infra.leapp.common : fetch_file_if_exists | Check if file exists] ******** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/fetch_file_if_exists.yml:7 ok: [managed-node01] => {"changed": false, "stat": {"atime": 1773063562.17761, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 16, "charset": "us-ascii", "checksum": "279322fe66376d161614e57fa0d849c60c1d6e3a", "ctime": 1773063527.4073074, "dev": 51716, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 478150822, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1773063527.4073074, "nlink": 1, "path": "/var/log/leapp/leapp-report.txt", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 7196, "uid": 0, "version": "2306891254", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} TASK [infra.leapp.common : fetch_file_if_exists | Copy report file to the controller] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/fetch_file_if_exists.yml:12 changed: [managed-node01] => {"changed": true, "checksum": "279322fe66376d161614e57fa0d849c60c1d6e3a", "dest": "/tmp/workdir_controllergjd6ffrh/ansible_leapp_analysis_logs_2026-03-09_13-38-09/managed-node01/leapp-report.txt", "md5sum": "85107aff8e717c549c0133afe116b001", "remote_checksum": "279322fe66376d161614e57fa0d849c60c1d6e3a", "remote_md5sum": null} TASK [infra.leapp.common : fetch_file_if_exists | Check if file exists] ******** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/fetch_file_if_exists.yml:7 ok: [managed-node01] => {"changed": false, "stat": {"atime": 1773063563.480621, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 32, "charset": "us-ascii", "checksum": "9c4fde23b857ceef38cbd6501fb7de90e9349519", "ctime": 1773063527.4073074, "dev": 51716, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 478150843, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "application/json", "mode": "0644", "mtime": 1773063527.4073074, "nlink": 1, "path": "/var/log/leapp/leapp-report.json", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 12449, "uid": 0, "version": "4249400452", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} TASK [infra.leapp.common : fetch_file_if_exists | Copy report file to the controller] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/fetch_file_if_exists.yml:12 changed: [managed-node01] => {"changed": true, "checksum": "9c4fde23b857ceef38cbd6501fb7de90e9349519", "dest": "/tmp/workdir_controllergjd6ffrh/ansible_leapp_analysis_logs_2026-03-09_13-38-09/managed-node01/leapp-report.json", "md5sum": "7ee673d624e5c39b30b02049c212935a", "remote_checksum": "9c4fde23b857ceef38cbd6501fb7de90e9349519", "remote_md5sum": null} TASK [infra.leapp.common : fetch_file_if_exists | Check if file exists] ******** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/fetch_file_if_exists.yml:7 ok: [managed-node01] => {"changed": false, "stat": {"atime": 1773063501.409069, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 3440, "charset": "us-ascii", "checksum": "439e17918788784abb5d0daa2c99640202344ab2", "ctime": 1773063527.3953073, "dev": 51716, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 478150820, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1773063527.3953073, "nlink": 1, "path": "/var/log/leapp/leapp-preupgrade.log", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 1759292, "uid": 0, "version": "65036714", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} TASK [infra.leapp.common : fetch_file_if_exists | Copy report file to the controller] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/fetch_file_if_exists.yml:12 changed: [managed-node01] => {"changed": true, "checksum": "439e17918788784abb5d0daa2c99640202344ab2", "dest": "/tmp/workdir_controllergjd6ffrh/ansible_leapp_analysis_logs_2026-03-09_13-38-09/managed-node01/leapp-preupgrade.log", "md5sum": "9e903a3e3cda2978d5c838102a33bc47", "remote_checksum": "439e17918788784abb5d0daa2c99640202344ab2", "remote_md5sum": null} TASK [copy_reports_to_controller | Copy log file to the controller] ************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/copy_reports_to_controller.yml:39 TASK [infra.leapp.common : copy_archive_leapp_log | Check for log file] ******** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/copy_archive_leapp_log.yml:11 ok: [managed-node01] => {"changed": false, "stat": {"atime": 1773063495.5690022, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 32, "charset": "us-ascii", "checksum": "6fcbe632a80688df5ea690175c8260ca1937d61f", "ctime": 1773063527.5233083, "dev": 51716, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 889192589, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "application/json", "mode": "0644", "mtime": 1773063527.5233083, "nlink": 1, "path": "/var/log/leapp/ansible_leapp_analysis.log", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 14095, "uid": 0, "version": "3923399081", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} TASK [infra.leapp.common : copy_archive_leapp_log | Add end time to log file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/copy_archive_leapp_log.yml:19 changed: [managed-node01] => {"backup": "", "changed": true, "msg": "line added"} TASK [infra.leapp.common : copy_archive_leapp_log | Slurp file /var/log/leapp/ansible_leapp_analysis.log] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/copy_archive_leapp_log.yml:27 ok: [managed-node01] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} TASK [infra.leapp.common : copy_archive_leapp_log | Decode file /var/log/leapp/ansible_leapp_analysis.log] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/copy_archive_leapp_log.yml:33 ok: [managed-node01] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} TASK [infra.leapp.common : copy_archive_leapp_log | Ensure reports directory on controller] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/copy_archive_leapp_log.yml:38 ok: [managed-node01 -> localhost] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/tmp/workdir_controllergjd6ffrh/ansible_leapp_analysis_logs_2026-03-09_13-38-09", "secontext": "unconfined_u:object_r:user_tmp_t:s0", "size": 28, "state": "directory", "uid": 0} TASK [infra.leapp.common : copy_archive_leapp_log | Copy ansible leapp log to the controller] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/copy_archive_leapp_log.yml:48 changed: [managed-node01] => {"changed": true, "checksum": "7162ec2da47af3a628edb3a584c018efa9cdcf5c", "dest": "/tmp/workdir_controllergjd6ffrh/ansible_leapp_analysis_logs_2026-03-09_13-38-09/managed-node01/ansible_leapp_analysis.log", "md5sum": "e8671455560f99769a47d32bc9e21ad2", "remote_checksum": "7162ec2da47af3a628edb3a584c018efa9cdcf5c", "remote_md5sum": null} TASK [infra.leapp.common : copy_archive_leapp_log | Copy log file to timestamped location] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/copy_archive_leapp_log.yml:54 changed: [managed-node01] => {"changed": true, "checksum": "7162ec2da47af3a628edb3a584c018efa9cdcf5c", "dest": "/var/log/leapp/ansible_leapp_analysis_2026-03-09_13-38-09.log", "gid": 0, "group": "root", "md5sum": "e8671455560f99769a47d32bc9e21ad2", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:var_log_t:s0", "size": 14129, "src": "/var/log/leapp/ansible_leapp_analysis.log", "state": "file", "uid": 0} TASK [infra.leapp.common : copy_archive_leapp_log | Remove original log file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/copy_archive_leapp_log.yml:66 changed: [managed-node01] => {"changed": true, "path": "/var/log/leapp/ansible_leapp_analysis.log", "state": "absent"} TASK [infra.leapp.analysis : Set stats for leapp_inhibitors] ******************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:27 ok: [managed-node01] => {"ansible_stats": {"aggregate": true, "data": {"leapp_inhibitors": [{"actor": "checktargetrepos", "audience": "sysadmin", "detail": {"external": [{"title": "UPGRADING TO RHEL 10", "url": "https://red.ht/upgrading-rhel9-to-rhel10-main-official-doc"}], "related_resources": [{"scheme": "file", "title": "/etc/leapp/files/leapp_upgrade_repositories.repo"}], "remediations": [{"context": "Create the repository file according to instructions in the referred document on the following path with all repositories that should be used during the upgrade: \"/etc/leapp/files/leapp_upgrade_repositories.repo\".\n\n", "type": "hint"}]}, "groups": ["sanity", "inhibitor"], "hostname": "managed-node01", "id": "0066748f127e715e337c6b149a74be2261eb889e9b752b6dc699573a6ce644cc", "key": "cbf9e2a5e21f047ae0954fb5e0fc0f21b02dcbb0", "severity": "high", "summary": "Leapp is run in the mode when the Red Hat Subscription Manager is not used (the --no-rhsm option or the LEAPP_NO_RHSM=1 environment variable has been set) so leapp is not able to obtain YUM/DNF repositories with the content for the target system in the standard way. The content has to be delivered either by user manually or, in case of public clouds, by a special Leapp package for RHUI environments.", "timeStamp": "2026-03-09T13:38:45.104238Z", "title": "Using RHSM has been skipped but no custom or RHUI repositories have been delivered."}, {"actor": "network_deprecations", "audience": "sysadmin", "detail": {"external": [{"title": "How to migrate the connection from ifcfg to NetworkManager keyfile plugin?", "url": "https://access.redhat.com/solutions/7083803"}, {"title": "nmcli(1) manual, describes \"connection migrate\" sub-command.", "url": "https://networkmanager.dev/docs/api/latest/nmcli.html"}, {"title": "nm-settings-ifcfg-rh(5), description of the \"ifcfg\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html"}, {"title": "nm-settings-keyfile(5), description of the \"keyfile\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html"}], "related_resources": [{"scheme": "package", "title": "NetworkManager"}, {"scheme": "file", "title": "/etc/sysconfig/network-scripts/ifcfg-eth0"}], "remediations": [{"context": "Convert the configuration into NetworkManager native \"keyfile\" format.", "type": "hint"}, {"context": ["nmcli", "connection", "migrate", "/etc/sysconfig/network-scripts/ifcfg-eth0"], "type": "command"}]}, "groups": ["network", "services", "inhibitor"], "hostname": "managed-node01", "id": "7fbf2b52543e22008a19bd665bb5ede6d799e98b8c558cc1f3d065d5d6f7385a", "key": "7de70b43c3c9d20075e30894ac24a4c4e2d70837", "severity": "high", "summary": "Network configuration files in legacy \"ifcfg\" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:\n - /etc/sysconfig/network-scripts/ifcfg-eth0", "timeStamp": "2026-03-09T13:38:45.625723Z", "title": "Legacy network configuration found"}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "91d9e908ec48d8e7289df5d1f2b9e5fe085cd4896e7d4b165885717761e87101", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n", "timeStamp": "2026-03-09T13:38:46.194322Z", "title": "Use of NFS detected. Upgrade can't proceed"}]}, "per_host": false}, "changed": false} TASK [infra.leapp.analysis : Notify analysis report is done handler] *********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:32 NOTIFIED HANDLER infra.leapp.analysis : Preupgrade analysis report is done for managed-node01 NOTIFIED HANDLER infra.leapp.analysis : Display inhibitors for managed-node01 NOTIFIED HANDLER infra.leapp.analysis : Display errors for managed-node01 changed: [managed-node01] => {"changed": true, "msg": "All assertions passed"} TASK [Test | Read hostvars file content] *************************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml:104 ok: [managed-node01 -> localhost] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} TASK [Test | Assert that hostvars file contains remediation_todo] ************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml:110 ok: [managed-node01 -> localhost] => { "changed": false, "msg": "All assertions passed" } TASK [Test | Print hostvars_file_content] ************************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml:116 ok: [managed-node01 -> localhost] => { "hostvars_file_content.content | b64decode | from_yaml": { "leapp_bool_variable": true, "leapp_dict_variable": { "key1": "value1", "key2": "value2" }, "leapp_int_variable": 123, "leapp_list_variable": [ "value1", "value2", "value3" ], "leapp_null_variable": null, "leapp_string_variable": "test value" } } TASK [Test | Print hostvars_file_new_content] ********************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml:120 ok: [managed-node01 -> localhost] => { "hostvars_file_new_content.content | b64decode | from_yaml": { "leapp_bool_variable": true, "leapp_dict_variable": { "key1": "value1", "key2": "value2" }, "leapp_int_variable": 123, "leapp_list_variable": [ "value1", "value2", "value3" ], "leapp_null_variable": null, "leapp_remediation_todo": [ "leapp_legacy_network_configuration", "leapp_nfs_detected" ], "leapp_string_variable": "test value" } } TASK [Test | Print hostvars_file_new_content without remediation_todo] ********* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml:124 ok: [managed-node01 -> localhost] => { "hostvars_file_new_content.content | b64decode | from_yaml | dict2items | rejectattr('key', 'equalto', 'leapp_remediation_todo') | items2dict": { "leapp_bool_variable": true, "leapp_dict_variable": { "key1": "value1", "key2": "value2" }, "leapp_int_variable": 123, "leapp_list_variable": [ "value1", "value2", "value3" ], "leapp_null_variable": null, "leapp_string_variable": "test value" } } TASK [Test | Print hostvars_file_content] ************************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml:131 ok: [managed-node01 -> localhost] => { "hostvars_file_content.content | b64decode | from_yaml": { "leapp_bool_variable": true, "leapp_dict_variable": { "key1": "value1", "key2": "value2" }, "leapp_int_variable": 123, "leapp_list_variable": [ "value1", "value2", "value3" ], "leapp_null_variable": null, "leapp_string_variable": "test value" } } TASK [Test | Assert that hostvars_file_new_content without remediation_todo is equal to hostvars_file_content] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_hostvars.yml:135 ok: [managed-node01 -> localhost] => { "changed": false, "msg": "All assertions passed" } RUNNING HANDLER [infra.leapp.analysis : Display inhibitors] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/handlers/main.yml:10 ok: [managed-node01] => { "results_inhibitors.stdout_lines": [ "Risk Factor: high (inhibitor)", "Title: Using RHSM has been skipped but no custom or RHUI repositories have been delivered.", "Summary: Leapp is run in the mode when the Red Hat Subscription Manager is not used (the --no-rhsm option or the LEAPP_NO_RHSM=1 environment variable has been set) so leapp is not able to obtain YUM/DNF repositories with the content for the target system in the standard way. The content has to be delivered either by user manually or, in case of public clouds, by a special Leapp package for RHUI environments.", "Related links:", " - UPGRADING TO RHEL 10: https://red.ht/upgrading-rhel9-to-rhel10-main-official-doc", "Remediation: [hint] Create the repository file according to instructions in the referred document on the following path with all repositories that should be used during the upgrade: \"/etc/leapp/files/leapp_upgrade_repositories.repo\".", "", "", "Key: cbf9e2a5e21f047ae0954fb5e0fc0f21b02dcbb0", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Legacy network configuration found", "Summary: Network configuration files in legacy \"ifcfg\" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:", " - /etc/sysconfig/network-scripts/ifcfg-eth0", "Related links:", " - How to migrate the connection from ifcfg to NetworkManager keyfile plugin?: https://access.redhat.com/solutions/7083803", " - nmcli(1) manual, describes \"connection migrate\" sub-command.: https://networkmanager.dev/docs/api/latest/nmcli.html", " - nm-settings-ifcfg-rh(5), description of the \"ifcfg\" format: https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html", " - nm-settings-keyfile(5), description of the \"keyfile\" format: https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html", "Remediation: [hint] Convert the configuration into NetworkManager native \"keyfile\" format.", "[command] nmcli connection migrate /etc/sysconfig/network-scripts/ifcfg-eth0", "Key: 7de70b43c3c9d20075e30894ac24a4c4e2d70837", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Use of NFS detected. Upgrade can't proceed", "Summary: NFS is currently not supported by the inplace upgrade.", "We have found NFS usage at the following locations:", "- NFS shares found in /etc/fstab:", " - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat", " - nest.test.redhat.com:/mnt/qa /mnt/qa", " - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive", " - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist", " - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew", " - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch", "", "Related links:", " - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006", "Remediation: [hint] Disable NFS temporarily for the upgrade if possible.", "Key: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "----------------------------------------" ] } RUNNING HANDLER [infra.leapp.analysis : Display errors] ************************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/handlers/main.yml:18 skipping: [managed-node01] => {} RUNNING HANDLER [infra.leapp.analysis : Preupgrade analysis report is done] **** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/handlers/main.yml:26 ok: [managed-node01] => { "msg": "The preupgrade analysis report generation is now complete. WARNING: Inhibitors found. Review the tasks above or the result file at /var/log/leapp/leapp-report.txt." } PLAY RECAP ********************************************************************* managed-node01 : ok=74 changed=24 unreachable=0 failed=0 skipped=15 rescued=0 ignored=0