[WARNING]: Collection infra.leapp does not support Ansible version 2.14.18 [WARNING]: running playbook inside collection infra.leapp ansible-playbook [core 2.14.18] config file = /etc/ansible/ansible.cfg configured module search path = ['/root/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] ansible python module location = /usr/lib/python3.9/site-packages/ansible ansible collection location = /root/.ansible/collections:/usr/share/ansible/collections executable location = /usr/bin/ansible-playbook python version = 3.9.23 (main, Aug 19 2025, 00:00:00) [GCC 11.5.0 20240719 (Red Hat 11.5.0-11)] (/usr/bin/python3) jinja version = 3.1.2 libyaml = True Using /etc/ansible/ansible.cfg as config file Skipping callback 'default', as we already have a stdout callback. Skipping callback 'minimal', as we already have a stdout callback. Skipping callback 'oneline', as we already have a stdout callback. PLAYBOOK: tests_default.yml **************************************************** 1 plays in /root/.ansible/collections/ansible_collections/infra/leapp/roles/upgrade/tests/tests_default.yml PLAY [Test] ******************************************************************** TASK [Gathering Facts] ********************************************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/upgrade/tests/tests_default.yml:2 ok: [managed-node01] TASK [Test | Run role upgrade] ************************************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/upgrade/tests/tests_default.yml:10 TASK [infra.leapp.common : Log directory exists] ******************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:3 ok: [managed-node01] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/var/log/ripu", "secontext": "unconfined_u:object_r:var_log_t:s0", "size": 70, "state": "directory", "uid": 0} TASK [infra.leapp.common : Check for existing log file] ************************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:11 ok: [managed-node01] => {"changed": false, "stat": {"exists": false}} TASK [infra.leapp.common : Fail if log file already exists] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:16 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : Create new log file] ******************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:21 NOTIFIED HANDLER infra.leapp.common : Check for log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Add end time to log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Slurp ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Decode ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Rename log file for managed-node01 changed: [managed-node01] => {"changed": true, "checksum": "e3a02d3fb94e9865d32a11880b376006b85c46fa", "dest": "/var/log/ripu/ripu.log", "gid": 0, "group": "root", "md5sum": "b2737e68848ba8e3eb0322b389e8b45d", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:var_log_t:s0", "size": 61, "src": "/root/.ansible/tmp/ansible-tmp-1763128468.464842-9799-10483341043414/source", "state": "file", "uid": 0} TASK [infra.leapp.common : /etc/ansible/facts.d directory exists] ************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:33 ok: [managed-node01] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc/ansible/facts.d", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 57, "state": "directory", "uid": 0} TASK [infra.leapp.common : Capture current ansible_facts for validation after upgrade] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:41 changed: [managed-node01] => {"changed": true, "checksum": "09ec1937d02f6a094451835700099ccc06844f88", "dest": "/etc/ansible/facts.d/pre_ripu.fact", "gid": 0, "group": "root", "md5sum": "02f941b0a714a6f85689027b75c156ea", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:etc_t:s0", "size": 12002, "src": "/root/.ansible/tmp/ansible-tmp-1763128469.3546093-9827-119784400690678/source", "state": "file", "uid": 0} TASK [infra.leapp.common : Capture a list of non-rhel versioned packages] ****** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:49 ok: [managed-node01] => {"changed": false, "cmd": "set -o pipefail; export PATH=$PATH; rpm -qa | grep -ve '[\\.|+]el7' | grep -vE '^(gpg-pubkey|libmodulemd|katello-ca-consumer)' | sort", "delta": "0:00:00.385156", "end": "2025-11-14 08:54:30.531371", "failed_when_result": false, "msg": "", "rc": 0, "start": "2025-11-14 08:54:30.146215", "stderr": "", "stderr_lines": [], "stdout": "epel-release-7-14.noarch\ntps-devel-2.44.50-1.noarch", "stdout_lines": ["epel-release-7-14.noarch", "tps-devel-2.44.50-1.noarch"]} TASK [infra.leapp.common : Create fact with the non-rhel versioned packages list] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:63 ok: [managed-node01] => {"ansible_facts": {"non_rhel_packages": ["epel-release-7-14.noarch", "tps-devel-2.44.50-1.noarch"]}, "changed": false} TASK [infra.leapp.common : Capture the list of non-rhel versioned packages in a separate fact file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:67 ok: [managed-node01] => {"changed": false, "checksum": "6d36b22d9c2b2f366fc090edfbac427c77d524a5", "dest": "/etc/ansible/facts.d/non_rhel_packages.fact", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/ansible/facts.d/non_rhel_packages.fact", "secontext": "system_u:object_r:etc_t:s0", "size": 58, "state": "file", "uid": 0} TASK [infra.leapp.upgrade : Include tasks for upgrade using redhat-upgrade-tool] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/upgrade/tasks/main.yml:9 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.upgrade : Include tasks for leapp upgrade] ******************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/upgrade/tasks/main.yml:13 [WARNING]: Collection community.general does not support Ansible version 2.14.18 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/upgrade/tasks/leapp-upgrade.yml for managed-node01 TASK [leapp-upgrade | Run parse_leapp_report to check for inhibitors] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/upgrade/tasks/leapp-upgrade.yml:2 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.upgrade : leapp-upgrade | Verify no inhibitor results found during preupgrade] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/upgrade/tasks/leapp-upgrade.yml:8 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.upgrade : leapp-upgrade | Register to leapp activation key] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/upgrade/tasks/leapp-upgrade.yml:14 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [leapp-upgrade | Include custom_local_repos for local_repos_pre_leapp] **** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/upgrade/tasks/leapp-upgrade.yml:25 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.upgrade : leapp-upgrade | Install packages for upgrade from RHEL 7] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/upgrade/tasks/leapp-upgrade.yml:33 ok: [managed-node01] => {"changed": false, "changes": {"installed": [], "updated": []}, "msg": "", "rc": 0, "results": ["All packages providing leapp-upgrade are up to date", ""]} TASK [infra.leapp.upgrade : leapp-upgrade | Install packages for upgrade from RHEL 8] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/upgrade/tasks/leapp-upgrade.yml:40 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.upgrade : leapp-upgrade | Install packages for upgrade from RHEL 9] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/upgrade/tasks/leapp-upgrade.yml:47 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.upgrade : leapp-upgrade | Include update-and-reboot.yml] ***** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/upgrade/tasks/leapp-upgrade.yml:54 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/upgrade/tasks/update-and-reboot.yml for managed-node01 TASK [infra.leapp.upgrade : update-and-reboot | Ensure all updates are applied] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/upgrade/tasks/update-and-reboot.yml:2 ASYNC OK on managed-node01: jid=j81184625953.1113 changed: [managed-node01] => {"ansible_job_id": "j81184625953.1113", "changed": true, "changes": {"installed": [], "updated": [["beakerlib-redhat", "1-35.el7bkr.noarch from beaker-harness"], ["lshw", "B.02.19-0.1.20180614git028f6b2.beaker.1.el7bkr.1.x86_64 from beaker-harness"], ["restraint-rhts", "0.4.14-1.el7bkr.x86_64 from beaker-harness"], ["restraint", "0.4.14-1.el7bkr.x86_64 from beaker-harness"]]}, "finished": 1, "msg": "", "rc": 0, "results": ["Loaded plugins: product-id, search-disabled-repos, subscription-manager\n\nThis system is not registered with an entitlement server. You can use subscription-manager to register.\n\nResolving Dependencies\n--> Running transaction check\n---> Package beakerlib-redhat.noarch 0:1-33.el7bkr will be updated\n---> Package beakerlib-redhat.noarch 0:1-35.el7bkr will be an update\n---> Package lshw.x86_64 0:B.02.18-17.el7 will be updated\n---> Package lshw.x86_64 0:B.02.19-0.1.20180614git028f6b2.beaker.1.el7bkr.1 will be an update\n---> Package restraint.x86_64 0:0.4.4-1.el7bkr will be updated\n---> Package restraint.x86_64 0:0.4.14-1.el7bkr will be an update\n---> Package restraint-rhts.x86_64 0:0.4.4-1.el7bkr will be updated\n---> Package restraint-rhts.x86_64 0:0.4.14-1.el7bkr will be an update\n--> Finished Dependency Resolution\n\nDependencies Resolved\n\n================================================================================\n Package Arch Version Repository Size\n================================================================================\nUpdating:\n beakerlib-redhat noarch 1-35.el7bkr beaker-harness 19 k\n lshw x86_64 B.02.19-0.1.20180614git028f6b2.beaker.1.el7bkr.1\n beaker-harness 361 k\n restraint x86_64 0.4.14-1.el7bkr beaker-harness 8.4 M\n restraint-rhts x86_64 0.4.14-1.el7bkr beaker-harness 59 k\n\nTransaction Summary\n================================================================================\nUpgrade 4 Packages\n\nTotal download size: 8.8 M\nDownloading packages:\nDelta RPMs disabled because /usr/bin/applydeltarpm not installed.\n--------------------------------------------------------------------------------\nTotal 28 MB/s | 8.8 MB 00:00 \nRunning transaction check\nRunning transaction test\nTransaction test succeeded\nRunning transaction\n Updating : restraint-0.4.14-1.el7bkr.x86_64 1/8 \n Updating : restraint-rhts-0.4.14-1.el7bkr.x86_64 2/8 \n Updating : lshw-B.02.19-0.1.20180614git028f6b2.beaker.1.el7bkr.1.x86_ 3/8 \n Updating : beakerlib-redhat-1-35.el7bkr.noarch 4/8 \n Cleanup : restraint-rhts-0.4.4-1.el7bkr.x86_64 5/8 \n Cleanup : beakerlib-redhat-1-33.el7bkr.noarch 6/8 \n Cleanup : restraint-0.4.4-1.el7bkr.x86_64 7/8 \n Cleanup : lshw-B.02.18-17.el7.x86_64 8/8 \n Verifying : restraint-rhts-0.4.14-1.el7bkr.x86_64 1/8 \n Verifying : restraint-0.4.14-1.el7bkr.x86_64 2/8 \n Verifying : beakerlib-redhat-1-35.el7bkr.noarch 3/8 \n Verifying : lshw-B.02.19-0.1.20180614git028f6b2.beaker.1.el7bkr.1.x86_ 4/8 \n Verifying : restraint-0.4.4-1.el7bkr.x86_64 5/8 \n Verifying : restraint-rhts-0.4.4-1.el7bkr.x86_64 6/8 \n Verifying : lshw-B.02.18-17.el7.x86_64 7/8 \n Verifying : beakerlib-redhat-1-33.el7bkr.noarch 8/8 \n\nUpdated:\n beakerlib-redhat.noarch 0:1-35.el7bkr \n lshw.x86_64 0:B.02.19-0.1.20180614git028f6b2.beaker.1.el7bkr.1 \n restraint.x86_64 0:0.4.14-1.el7bkr \n restraint-rhts.x86_64 0:0.4.14-1.el7bkr \n\nComplete!\n"], "results_file": "/root/.ansible_async/j81184625953.1113", "started": 1, "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} TASK [infra.leapp.upgrade : update-and-reboot | Reboot when updates applied] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/upgrade/tasks/update-and-reboot.yml:10 changed: [managed-node01] => {"changed": true, "elapsed": 120, "rebooted": true} TASK [leapp-upgrade | Create /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/upgrade/tasks/leapp-upgrade.yml:58 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.upgrade : leapp-upgrade | Include disable-previous-repo-files.yml] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/upgrade/tasks/leapp-upgrade.yml:69 skipping: [managed-node01] => {"changed": false, "skipped_reason": "No items in the list"} TASK [infra.leapp.upgrade : leapp-upgrade | Include rmmod-kernel-modules.yml] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/upgrade/tasks/leapp-upgrade.yml:75 skipping: [managed-node01] => {"changed": false, "skipped_reason": "No items in the list"} TASK [infra.leapp.upgrade : leapp-upgrade | Start Leapp OS upgrade] ************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/upgrade/tasks/leapp-upgrade.yml:81 ASYNC FAILED on managed-node01: jid=j920909032031.7900 fatal: [managed-node01]: FAILED! => {"ansible_job_id": "j920909032031.7900", "changed": true, "cmd": "set -o pipefail; export PATH=$PATH; ulimit -n 16384; leapp upgrade --report-schema=1.2.0 2>&1 | tee -a /var/log/ripu/ripu.log\n", "delta": "0:00:38.948329", "end": "2025-11-14 08:58:24.184857", "finished": 1, "msg": "non-zero return code", "rc": 1, "results_file": "/root/.ansible_async/j920909032031.7900", "start": "2025-11-14 08:57:45.236528", "started": 1, "stderr": "", "stderr_lines": [], "stdout": "==> Processing phase `configuration_phase`\n====> * ipu_workflow_config\n IPU workflow config actor\n==> Processing phase `FactsCollection`\n====> * get_enabled_modules\n Provides data about which module streams are enabled on the source system.\n====> * removed_pam_modules_scanner\n Scan PAM configuration for modules that are not available in RHEL-8.\n====> * scanzfcp\n In case of s390x architecture, check whether ZFCP is used.\n====> * scan_kernel_cmdline\n No documentation has been provided for the scan_kernel_cmdline actor.\n====> * system_facts\n Provides data about many facts from system.\n====> * pam_modules_scanner\n Scan the pam directory for services and modules used in them\n====> * repository_mapping\n Produces message containing repository mapping based on provided file.\n====> * firewalld_facts_actor\n Provide data about firewalld\n====> * root_scanner\n Scan the system root directory and produce a message containing\n====> * check_grub_legacy\n Check whether GRUB Legacy is installed in the MBR.\n====> * scanclienablerepo\n Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.\n====> * scan_files_for_target_userspace\n Scan the source system and identify files that will be copied into the target userspace when it is created.\n====> * rpm_scanner\n Provides data about installed RPM Packages.\nLoaded plugins: product-id, subscription-manager\n\nThis system is not registered with an entitlement server. You can use subscription-manager to register.\n\n====> * authselect_scanner\n Detect what authselect configuration should be suggested to administrator.\n====> * transaction_workarounds\n Provides additional RPM transaction tasks based on bundled RPM packages.\n====> * scan_grub_config\n Scan grub configuration files for errors.\n====> * register_yum_adjustment\n Registers a workaround which will adjust the yum directories during the upgrade.\n====> * common_leapp_dracut_modules\n Influences the generation of the initram disk\n====> * scan_custom_modifications_actor\n Collects information about files in leapp directories that have been modified or newly added.\n====> * scan_subscription_manager_info\n Scans the current system for subscription manager information\n====> * scan_target_os_image\n Scans the provided target OS ISO image to use as a content source for the IPU, if any.\n====> * load_device_driver_deprecation_data\n Loads deprecation data for drivers and devices (PCI & CPU)\n====> * scandasd\n In case of s390x architecture, check whether DASD is used.\n====> * scan_custom_repofile\n Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.\n====> * sssd_facts\n Check SSSD configuration for changes in RHEL8 and report them in model.\n====> * read_openssh_config\n Collect information about the OpenSSH configuration.\n====> * scanmemory\n Scan Memory of the machine.\n====> * scan_fips\n Determine whether the source system has FIPS enabled.\n====> * source_boot_loader_scanner\n Scans the boot loader configuration on the source system.\n====> * detect_kernel_drivers\n Matches all currently loaded kernel drivers against known deprecated and removed drivers.\n====> * pci_devices_scanner\n Provides data about existing PCI Devices.\n====> * persistentnetnames\n Get network interface information for physical ethernet interfaces of the original system.\n====> * distribution_signed_rpm_scanner\n Provide data about distribution signed & unsigned RPM packages.\n====> * checkrhui\n Check if system is using RHUI infrastructure (on public cloud) and send messages to\n====> * scan_grub_device_name\n Find the name of the block devices where GRUB is located\n====> * udevadm_info\n Produces data exported by the \"udevadm info\" command.\n====> * selinuxcontentscanner\n Scan the system for any SELinux customizations\n====> * persistentnetnamesdisable\n Disable systemd-udevd persistent network naming on machine with single eth0 NIC\n====> * tcp_wrappers_config_read\n Parse tcp_wrappers configuration files /etc/hosts.{allow,deny}.\n====> * copy_dnf_conf_into_target_userspace\n Copy dnf.conf into target userspace\n====> * scan_pkg_manager\n Provides data about package manager (yum/dnf)\n====> * network_manager_read_config\n Provides data about NetworkManager configuration.\n====> * sctp_read_status\n Determines whether or not the SCTP kernel module might be wanted.\n====> * scan_sap_hana\n Gathers information related to SAP HANA instances on the system.\n====> * remove_obsolete_gpg_keys\n Remove obsoleted RPM GPG keys.\n====> * scan_source_files\n Scan files (explicitly specified) of the source system.\n====> * spamassassin_config_read\n Reads spamc configuration (/etc/mail/spamassassin/spamc.conf), the\n====> * multipath_conf_read\n Read multipath configuration files and extract the necessary information\n====> * storage_scanner\n Provides data about storage settings.\n====> * quagga_daemons\n Active quagga daemons check.\n====> * scan_source_kernel\n Scan the source system kernel.\n====> * check_kde_apps\n Actor checks which KDE apps are installed.\n====> * get_installed_desktops\n Actor checks if kde or gnome desktop environments\n====> * scan_systemd_source\n Provides info about systemd on the source system\n====> * scancpu\n Scan CPUs of the machine.\n====> * used_repository_scanner\n Scan used enabled repositories\n====> * repositories_blacklist\n Exclude target repositories provided by Red Hat without support.\n====> * trusted_gpg_keys_scanner\n Scan for trusted GPG keys.\n====> * scan_grub_device_partition_layout\n Scan all identified GRUB devices for their partition layout.\n====> * satellite_upgrade_facts\n Report which Satellite packages require updates and how to handle PostgreSQL data\n====> * cups_scanner\n Gather facts about CUPS features which needs to be migrated\n====> * rpm_transaction_config_tasks_collector\n Provides additional RPM transaction tasks from /etc/leapp/transaction.\n====> * ipa_scanner\n Scan system for ipa-client and ipa-server status\n====> * xfs_info_scanner\n This actor scans all mounted mountpoints for XFS information\n====> * biosdevname\n Enable biosdevname on the target RHEL system if all interfaces on the source RHEL\n====> * scan_dynamic_linker_configuration\n Scan the dynamic linker configuration and find modifications.\n====> * vsftpd_config_read\n Reads vsftpd configuration files (/etc/vsftpd/*.conf) and extracts necessary information.\n====> * pes_events_scanner\n Provides data about package events from Package Evolution Service.\n====> * setuptargetrepos\n Produces list of repositories that should be available to be used by Upgrade process.\n\n============================================================\n ERRORS \n============================================================\n\n2025-11-14 08:58:04.707032 [ERROR] Actor: scan_subscription_manager_info\nMessage: A subscription-manager command failed to execute\nSummary:\n Link: https://access.redhat.com/solutions/6138372\n Details: Command ['subscription-manager', 'release'] failed with exit code 1.\n Stderr: This system is not yet registered. Try 'subscription-manager register --help' for more information.\n Hint: Please ensure you have a valid RHEL subscription and your network is up. If you are using proxy for Red Hat subscription-manager, please make sure it is specified inside the /etc/rhsm/rhsm.conf file. Or use the --no-rhsm option when running leapp, if you do not want to use subscription-manager for the in-place upgrade and you want to deliver all target repositories by yourself or using RHUI on public cloud.\n\n============================================================\n END OF ERRORS \n============================================================\n\nDebug output written to /var/log/leapp/leapp-upgrade.log\n\n============================================================\n REPORT OVERVIEW \n============================================================\n\nFollowing errors occurred and the upgrade cannot continue:\n 1. Actor: scan_subscription_manager_info\n Message: A subscription-manager command failed to execute\n\nHIGH and MEDIUM severity reports:\n 1. Packages available in excluded repositories will not be installed\n\nReports summary:\n Errors: 1\n Inhibitors: 0\n HIGH severity reports: 1\n MEDIUM severity reports: 0\n LOW severity reports: 0\n INFO severity reports: 1\n\nBefore continuing, review the full report below for details about discovered problems and possible remediation instructions:\n A report has been generated at /var/log/leapp/leapp-report.txt\n A report has been generated at /var/log/leapp/leapp-report.json\n\n============================================================\n END OF REPORT OVERVIEW \n============================================================\n\nAnswerfile has been generated at /var/log/leapp/answerfile", "stdout_lines": ["==> Processing phase `configuration_phase`", "====> * ipu_workflow_config", " IPU workflow config actor", "==> Processing phase `FactsCollection`", "====> * get_enabled_modules", " Provides data about which module streams are enabled on the source system.", "====> * removed_pam_modules_scanner", " Scan PAM configuration for modules that are not available in RHEL-8.", "====> * scanzfcp", " In case of s390x architecture, check whether ZFCP is used.", "====> * scan_kernel_cmdline", " No documentation has been provided for the scan_kernel_cmdline actor.", "====> * system_facts", " Provides data about many facts from system.", "====> * pam_modules_scanner", " Scan the pam directory for services and modules used in them", "====> * repository_mapping", " Produces message containing repository mapping based on provided file.", "====> * firewalld_facts_actor", " Provide data about firewalld", "====> * root_scanner", " Scan the system root directory and produce a message containing", "====> * check_grub_legacy", " Check whether GRUB Legacy is installed in the MBR.", "====> * scanclienablerepo", " Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.", "====> * scan_files_for_target_userspace", " Scan the source system and identify files that will be copied into the target userspace when it is created.", "====> * rpm_scanner", " Provides data about installed RPM Packages.", "Loaded plugins: product-id, subscription-manager", "", "This system is not registered with an entitlement server. You can use subscription-manager to register.", "", "====> * authselect_scanner", " Detect what authselect configuration should be suggested to administrator.", "====> * transaction_workarounds", " Provides additional RPM transaction tasks based on bundled RPM packages.", "====> * scan_grub_config", " Scan grub configuration files for errors.", "====> * register_yum_adjustment", " Registers a workaround which will adjust the yum directories during the upgrade.", "====> * common_leapp_dracut_modules", " Influences the generation of the initram disk", "====> * scan_custom_modifications_actor", " Collects information about files in leapp directories that have been modified or newly added.", "====> * scan_subscription_manager_info", " Scans the current system for subscription manager information", "====> * scan_target_os_image", " Scans the provided target OS ISO image to use as a content source for the IPU, if any.", "====> * load_device_driver_deprecation_data", " Loads deprecation data for drivers and devices (PCI & CPU)", "====> * scandasd", " In case of s390x architecture, check whether DASD is used.", "====> * scan_custom_repofile", " Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.", "====> * sssd_facts", " Check SSSD configuration for changes in RHEL8 and report them in model.", "====> * read_openssh_config", " Collect information about the OpenSSH configuration.", "====> * scanmemory", " Scan Memory of the machine.", "====> * scan_fips", " Determine whether the source system has FIPS enabled.", "====> * source_boot_loader_scanner", " Scans the boot loader configuration on the source system.", "====> * detect_kernel_drivers", " Matches all currently loaded kernel drivers against known deprecated and removed drivers.", "====> * pci_devices_scanner", " Provides data about existing PCI Devices.", "====> * persistentnetnames", " Get network interface information for physical ethernet interfaces of the original system.", "====> * distribution_signed_rpm_scanner", " Provide data about distribution signed & unsigned RPM packages.", "====> * checkrhui", " Check if system is using RHUI infrastructure (on public cloud) and send messages to", "====> * scan_grub_device_name", " Find the name of the block devices where GRUB is located", "====> * udevadm_info", " Produces data exported by the \"udevadm info\" command.", "====> * selinuxcontentscanner", " Scan the system for any SELinux customizations", "====> * persistentnetnamesdisable", " Disable systemd-udevd persistent network naming on machine with single eth0 NIC", "====> * tcp_wrappers_config_read", " Parse tcp_wrappers configuration files /etc/hosts.{allow,deny}.", "====> * copy_dnf_conf_into_target_userspace", " Copy dnf.conf into target userspace", "====> * scan_pkg_manager", " Provides data about package manager (yum/dnf)", "====> * network_manager_read_config", " Provides data about NetworkManager configuration.", "====> * sctp_read_status", " Determines whether or not the SCTP kernel module might be wanted.", "====> * scan_sap_hana", " Gathers information related to SAP HANA instances on the system.", "====> * remove_obsolete_gpg_keys", " Remove obsoleted RPM GPG keys.", "====> * scan_source_files", " Scan files (explicitly specified) of the source system.", "====> * spamassassin_config_read", " Reads spamc configuration (/etc/mail/spamassassin/spamc.conf), the", "====> * multipath_conf_read", " Read multipath configuration files and extract the necessary information", "====> * storage_scanner", " Provides data about storage settings.", "====> * quagga_daemons", " Active quagga daemons check.", "====> * scan_source_kernel", " Scan the source system kernel.", "====> * check_kde_apps", " Actor checks which KDE apps are installed.", "====> * get_installed_desktops", " Actor checks if kde or gnome desktop environments", "====> * scan_systemd_source", " Provides info about systemd on the source system", "====> * scancpu", " Scan CPUs of the machine.", "====> * used_repository_scanner", " Scan used enabled repositories", "====> * repositories_blacklist", " Exclude target repositories provided by Red Hat without support.", "====> * trusted_gpg_keys_scanner", " Scan for trusted GPG keys.", "====> * scan_grub_device_partition_layout", " Scan all identified GRUB devices for their partition layout.", "====> * satellite_upgrade_facts", " Report which Satellite packages require updates and how to handle PostgreSQL data", "====> * cups_scanner", " Gather facts about CUPS features which needs to be migrated", "====> * rpm_transaction_config_tasks_collector", " Provides additional RPM transaction tasks from /etc/leapp/transaction.", "====> * ipa_scanner", " Scan system for ipa-client and ipa-server status", "====> * xfs_info_scanner", " This actor scans all mounted mountpoints for XFS information", "====> * biosdevname", " Enable biosdevname on the target RHEL system if all interfaces on the source RHEL", "====> * scan_dynamic_linker_configuration", " Scan the dynamic linker configuration and find modifications.", "====> * vsftpd_config_read", " Reads vsftpd configuration files (/etc/vsftpd/*.conf) and extracts necessary information.", "====> * pes_events_scanner", " Provides data about package events from Package Evolution Service.", "====> * setuptargetrepos", " Produces list of repositories that should be available to be used by Upgrade process.", "", "============================================================", " ERRORS ", "============================================================", "", "2025-11-14 08:58:04.707032 [ERROR] Actor: scan_subscription_manager_info", "Message: A subscription-manager command failed to execute", "Summary:", " Link: https://access.redhat.com/solutions/6138372", " Details: Command ['subscription-manager', 'release'] failed with exit code 1.", " Stderr: This system is not yet registered. Try 'subscription-manager register --help' for more information.", " Hint: Please ensure you have a valid RHEL subscription and your network is up. If you are using proxy for Red Hat subscription-manager, please make sure it is specified inside the /etc/rhsm/rhsm.conf file. Or use the --no-rhsm option when running leapp, if you do not want to use subscription-manager for the in-place upgrade and you want to deliver all target repositories by yourself or using RHUI on public cloud.", "", "============================================================", " END OF ERRORS ", "============================================================", "", "Debug output written to /var/log/leapp/leapp-upgrade.log", "", "============================================================", " REPORT OVERVIEW ", "============================================================", "", "Following errors occurred and the upgrade cannot continue:", " 1. Actor: scan_subscription_manager_info", " Message: A subscription-manager command failed to execute", "", "HIGH and MEDIUM severity reports:", " 1. Packages available in excluded repositories will not be installed", "", "Reports summary:", " Errors: 1", " Inhibitors: 0", " HIGH severity reports: 1", " MEDIUM severity reports: 0", " LOW severity reports: 0", " INFO severity reports: 1", "", "Before continuing, review the full report below for details about discovered problems and possible remediation instructions:", " A report has been generated at /var/log/leapp/leapp-report.txt", " A report has been generated at /var/log/leapp/leapp-report.json", "", "============================================================", " END OF REPORT OVERVIEW ", "============================================================", "", "Answerfile has been generated at /var/log/leapp/answerfile"]} TASK [leapp-upgrade | Run parse_leapp_report to check for inhibitors] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/upgrade/tasks/leapp-upgrade.yml:97 TASK [infra.leapp.common : parse_leapp_report | Default upgrade_inhibited to false] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:12 ok: [managed-node01] => {"ansible_facts": {"upgrade_inhibited": false}, "changed": false} TASK [infra.leapp.common : parse_leapp_report | Collect human readable report results] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:16 ok: [managed-node01] => {"changed": false, "content": "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", "encoding": "base64", "source": "/var/log/leapp/leapp-report.txt"} TASK [infra.leapp.common : parse_leapp_report | Collect JSON report results] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:21 ok: [managed-node01] => {"changed": false, "content": "ewogICJsZWFwcF9ydW5faWQiOiAiMGMzMjM3OGQtOTdhMC00Y2Q2LWJlNWYtZWIxZmM3ZTA5MTQwIiwgCiAgImVudHJpZXMiOiBbCiAgICB7CiAgICAgICJncm91cHMiOiBbCiAgICAgICAgImVycm9yIgogICAgICBdLCAKICAgICAgInRpdGxlIjogIkEgc3Vic2NyaXB0aW9uLW1hbmFnZXIgY29tbWFuZCBmYWlsZWQgdG8gZXhlY3V0ZSIsIAogICAgICAidGltZVN0YW1wIjogIjIwMjUtMTEtMTRUMTM6NTg6MDQuNzA3MjQzWiIsIAogICAgICAiaG9zdG5hbWUiOiAibWFuYWdlZC1ub2RlMDEiLCAKICAgICAgImFjdG9yIjogInNjYW5fc3Vic2NyaXB0aW9uX21hbmFnZXJfaW5mbyIsIAogICAgICAic3VtbWFyeSI6ICJ7XCJsaW5rXCI6IFwiaHR0cHM6Ly9hY2Nlc3MucmVkaGF0LmNvbS9zb2x1dGlvbnMvNjEzODM3MlwiLCBcImRldGFpbHNcIjogXCJDb21tYW5kIFsnc3Vic2NyaXB0aW9uLW1hbmFnZXInLCAncmVsZWFzZSddIGZhaWxlZCB3aXRoIGV4aXQgY29kZSAxLlwiLCBcInN0ZGVyclwiOiBcIlRoaXMgc3lzdGVtIGlzIG5vdCB5ZXQgcmVnaXN0ZXJlZC4gVHJ5ICdzdWJzY3JpcHRpb24tbWFuYWdlciByZWdpc3RlciAtLWhlbHAnIGZvciBtb3JlIGluZm9ybWF0aW9uLlxcblwiLCBcImhpbnRcIjogXCJQbGVhc2UgZW5zdXJlIHlvdSBoYXZlIGEgdmFsaWQgUkhFTCBzdWJzY3JpcHRpb24gYW5kIHlvdXIgbmV0d29yayBpcyB1cC4gSWYgeW91IGFyZSB1c2luZyBwcm94eSBmb3IgUmVkIEhhdCBzdWJzY3JpcHRpb24tbWFuYWdlciwgcGxlYXNlIG1ha2Ugc3VyZSBpdCBpcyBzcGVjaWZpZWQgaW5zaWRlIHRoZSAvZXRjL3Joc20vcmhzbS5jb25mIGZpbGUuIE9yIHVzZSB0aGUgLS1uby1yaHNtIG9wdGlvbiB3aGVuIHJ1bm5pbmcgbGVhcHAsIGlmIHlvdSBkbyBub3Qgd2FudCB0byB1c2Ugc3Vic2NyaXB0aW9uLW1hbmFnZXIgZm9yIHRoZSBpbi1wbGFjZSB1cGdyYWRlIGFuZCB5b3Ugd2FudCB0byBkZWxpdmVyIGFsbCB0YXJnZXQgcmVwb3NpdG9yaWVzIGJ5IHlvdXJzZWxmIG9yIHVzaW5nIFJIVUkgb24gcHVibGljIGNsb3VkLlwifSIsIAogICAgICAiYXVkaWVuY2UiOiAic3lzYWRtaW4iLCAKICAgICAgImtleSI6ICI3ZWM4MjY5Nzg0ZGIxYmJhMmFjNTRhZTQzODY4OWVmMzk3ZTE2ODMzIiwgCiAgICAgICJpZCI6ICJmODljMGRjYTg0Y2Y0ZGQzNWY1MDE3YWRjMGM1MjI4MzY1OThkOGVjZGEzMWM3YWJkNDZmZmRiNWQ4Y2VjNmY4IiwgCiAgICAgICJzZXZlcml0eSI6ICJoaWdoIgogICAgfSwgCiAgICB7CiAgICAgICJncm91cHMiOiBbCiAgICAgICAgInJlcG9zaXRvcnkiLCAKICAgICAgICAiZmFpbHVyZSIKICAgICAgXSwgCiAgICAgICJ0aXRsZSI6ICJFeGNsdWRlZCB0YXJnZXQgc3lzdGVtIHJlcG9zaXRvcmllcyIsIAogICAgICAidGltZVN0YW1wIjogIjIwMjUtMTEtMTRUMTM6NTg6MjEuMjI3ODQ1WiIsIAogICAgICAiaG9zdG5hbWUiOiAibWFuYWdlZC1ub2RlMDEiLCAKICAgICAgImRldGFpbCI6IHsKICAgICAgICAicmVtZWRpYXRpb25zIjogWwogICAgICAgICAgewogICAgICAgICAgICAidHlwZSI6ICJoaW50IiwgCiAgICAgICAgICAgICJjb250ZXh0IjogIklmIHNvbWUgb2YgZXhjbHVkZWQgcmVwb3NpdG9yaWVzIGFyZSBzdGlsbCByZXF1aXJlZCB0byBiZSB1c2VkIGR1cmluZyB0aGUgdXBncmFkZSwgZXhlY3V0ZSBsZWFwcCB3aXRoIHRoZSAtLWVuYWJsZXJlcG8gb3B0aW9uIHdpdGggdGhlIHJlcG9pZCBvZiB0aGUgcmVwb3NpdG9yeSByZXF1aXJlZCB0byBiZSBlbmFibGVkIGFzIGFuIGFyZ3VtZW50ICh0aGUgb3B0aW9uIGNhbiBiZSB1c2VkIG11bHRpcGxlIHRpbWVzKS4iCiAgICAgICAgICB9CiAgICAgICAgXQogICAgICB9LCAKICAgICAgImFjdG9yIjogInJlcG9zaXRvcmllc19ibGFja2xpc3QiLCAKICAgICAgInN1bW1hcnkiOiAiVGhlIGZvbGxvd2luZyByZXBvc2l0b3JpZXMgYXJlIG5vdCBzdXBwb3J0ZWQgYnkgUmVkIEhhdCBhbmQgYXJlIGV4Y2x1ZGVkIGZyb20gdGhlIGxpc3Qgb2YgcmVwb3NpdG9yaWVzIHVzZWQgZHVyaW5nIHRoZSB1cGdyYWRlLlxuLSBjb2RlcmVhZHktYnVpbGRlci1iZXRhLWZvci1yaGVsLTgtczM5MHgtcnBtc1xuLSBjb2RlcmVhZHktYnVpbGRlci1iZXRhLWZvci1yaGVsLTgtcHBjNjRsZS1ycG1zXG4tIHJodWktY29kZXJlYWR5LWJ1aWxkZXItZm9yLXJoZWwtOC14ODZfNjQtcmh1aS1ycG1zXG4tIGNvZGVyZWFkeS1idWlsZGVyLWZvci1yaGVsLTgtYWFyY2g2NC1ldXMtcnBtc1xuLSBjb2RlcmVhZHktYnVpbGRlci1mb3ItcmhlbC04LXBwYzY0bGUtZXVzLXJwbXNcbi0gY29kZXJlYWR5LWJ1aWxkZXItYmV0YS1mb3ItcmhlbC04LXg4Nl82NC1ycG1zXG4tIGNvZGVyZWFkeS1idWlsZGVyLWZvci1yaGVsLTgtYWFyY2g2NC1ycG1zXG4tIGNvZGVyZWFkeS1idWlsZGVyLWZvci1yaGVsLTgtczM5MHgtcnBtc1xuLSBjb2RlcmVhZHktYnVpbGRlci1mb3ItcmhlbC04LXMzOTB4LWV1cy1ycG1zXG4tIGNvZGVyZWFkeS1idWlsZGVyLWZvci1yaGVsLTgteDg2XzY0LWV1cy1ycG1zXG4tIHJodWktY29kZXJlYWR5LWJ1aWxkZXItZm9yLXJoZWwtOC1hYXJjaDY0LXJodWktcnBtc1xuLSBjb2RlcmVhZHktYnVpbGRlci1iZXRhLWZvci1yaGVsLTgtYWFyY2g2NC1ycG1zXG4tIGNvZGVyZWFkeS1idWlsZGVyLWZvci1yaGVsLTgtcmh1aS1ycG1zXG4tIGNvZGVyZWFkeS1idWlsZGVyLWZvci1yaGVsLTgteDg2XzY0LXJodWktcnBtc1xuLSBjb2RlcmVhZHktYnVpbGRlci1mb3ItcmhlbC04LXg4Nl82NC1ycG1zXG4tIGNvZGVyZWFkeS1idWlsZGVyLWZvci1yaGVsLTgteDg2XzY0LWV1cy1yaHVpLXJwbXNcbi0gY29kZXJlYWR5LWJ1aWxkZXItZm9yLXJoZWwtOC1wcGM2NGxlLXJwbXMiLCAKICAgICAgImF1ZGllbmNlIjogInN5c2FkbWluIiwgCiAgICAgICJrZXkiOiAiMWI5MTMyY2IyMzYyYWU3ODMwZTQ4ZWVlNzgxMWJlOTUyNzc0N2RlOCIsIAogICAgICAiaWQiOiAiZTNlMzczNjFiZTVkNTA2MDJmMTBiNzdiZTczMzI5MGRkNDM0ODQ1YTk4NTc0YWUwYTRjNTBjOTc3ZGU1ODU3OCIsIAogICAgICAic2V2ZXJpdHkiOiAiaW5mbyIKICAgIH0sIAogICAgewogICAgICAiZ3JvdXBzIjogWwogICAgICAgICJyZXBvc2l0b3J5IgogICAgICBdLCAKICAgICAgInRpdGxlIjogIlBhY2thZ2VzIGF2YWlsYWJsZSBpbiBleGNsdWRlZCByZXBvc2l0b3JpZXMgd2lsbCBub3QgYmUgaW5zdGFsbGVkIiwgCiAgICAgICJ0aW1lU3RhbXAiOiAiMjAyNS0xMS0xNFQxMzo1ODoyMy41NTU5OTZaIiwgCiAgICAgICJob3N0bmFtZSI6ICJtYW5hZ2VkLW5vZGUwMSIsIAogICAgICAiZGV0YWlsIjogewogICAgICAgICJyZWxhdGVkX3Jlc291cmNlcyI6IFsKICAgICAgICAgIHsKICAgICAgICAgICAgInNjaGVtZSI6ICJwYWNrYWdlIiwgCiAgICAgICAgICAgICJ0aXRsZSI6ICJweXRob24zLXB5eGF0dHIiCiAgICAgICAgICB9LCAKICAgICAgICAgIHsKICAgICAgICAgICAgInNjaGVtZSI6ICJwYWNrYWdlIiwgCiAgICAgICAgICAgICJ0aXRsZSI6ICJycGNnZW4iCiAgICAgICAgICB9CiAgICAgICAgXQogICAgICB9LCAKICAgICAgImFjdG9yIjogInBlc19ldmVudHNfc2Nhbm5lciIsIAogICAgICAic3VtbWFyeSI6ICIyIHBhY2thZ2VzIHdpbGwgYmUgc2tpcHBlZCBiZWNhdXNlIHRoZXkgYXJlIGF2YWlsYWJsZSBvbmx5IGluIHRhcmdldCBzeXN0ZW0gcmVwb3NpdG9yaWVzIHRoYXQgYXJlIGludGVudGlvbmFsbHkgZXhjbHVkZWQgZnJvbSB0aGUgbGlzdCBvZiByZXBvc2l0b3JpZXMgdXNlZCBkdXJpbmcgdGhlIHVwZ3JhZGUuIFNlZSB0aGUgcmVwb3J0IG1lc3NhZ2UgdGl0bGVkIFwiRXhjbHVkZWQgdGFyZ2V0IHN5c3RlbSByZXBvc2l0b3JpZXNcIiBmb3IgZGV0YWlscy5cblRoZSBsaXN0IG9mIHRoZXNlIHBhY2thZ2VzOlxuLSBweXRob24zLXB5eGF0dHIgKHJlcG9pZDogY29kZXJlYWR5LWJ1aWxkZXItZm9yLXJoZWwtOC14ODZfNjQtcnBtcylcbi0gcnBjZ2VuIChyZXBvaWQ6IGNvZGVyZWFkeS1idWlsZGVyLWZvci1yaGVsLTgteDg2XzY0LXJwbXMpIiwgCiAgICAgICJhdWRpZW5jZSI6ICJzeXNhZG1pbiIsIAogICAgICAia2V5IjogIjI0MzdlMjA0ODA4Zjk4NzQ3N2MwZTliZThlNGM5NWIzYTg3YTlmM2UiLCAKICAgICAgImlkIjogIjVkYmE1NzY3ODNhNTViMDIzNDkwMDUzZTBhYTc3N2Q2YjdhNzEzODI5NDg0ZTNhOTUyN2I3NWY4ZTYwODY2NDciLCAKICAgICAgInNldmVyaXR5IjogImhpZ2giCiAgICB9CiAgXQp9Cg==", "encoding": "base64", "source": "/var/log/leapp/leapp-report.json"} TASK [infra.leapp.common : parse_leapp_report | Parse report results] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:26 ok: [managed-node01] => {"ansible_facts": {"leapp_report_json": {"entries": [{"actor": "scan_subscription_manager_info", "audience": "sysadmin", "groups": ["error"], "hostname": "managed-node01", "id": "f89c0dca84cf4dd35f5017adc0c522836598d8ecda31c7abd46ffdb5d8cec6f8", "key": "7ec8269784db1bba2ac54ae438689ef397e16833", "severity": "high", "summary": "{\"link\": \"https://access.redhat.com/solutions/6138372\", \"details\": \"Command ['subscription-manager', 'release'] failed with exit code 1.\", \"stderr\": \"This system is not yet registered. Try 'subscription-manager register --help' for more information.\\n\", \"hint\": \"Please ensure you have a valid RHEL subscription and your network is up. If you are using proxy for Red Hat subscription-manager, please make sure it is specified inside the /etc/rhsm/rhsm.conf file. Or use the --no-rhsm option when running leapp, if you do not want to use subscription-manager for the in-place upgrade and you want to deliver all target repositories by yourself or using RHUI on public cloud.\"}", "timeStamp": "2025-11-14T13:58:04.707243Z", "title": "A subscription-manager command failed to execute"}, {"actor": "repositories_blacklist", "audience": "sysadmin", "detail": {"remediations": [{"context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "type": "hint"}]}, "groups": ["repository", "failure"], "hostname": "managed-node01", "id": "e3e37361be5d50602f10b77be733290dd434845a98574ae0a4c50c977de58578", "key": "1b9132cb2362ae7830e48eee7811be9527747de8", "severity": "info", "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms", "timeStamp": "2025-11-14T13:58:21.227845Z", "title": "Excluded target system repositories"}, {"actor": "pes_events_scanner", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "python3-pyxattr"}, {"scheme": "package", "title": "rpcgen"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "5dba576783a55b023490053e0aa777d6b7a713829484e3a9527b75f8e6086647", "key": "2437e204808f987477c0e9be8e4c95b3a87a9f3e", "severity": "high", "summary": "2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", "timeStamp": "2025-11-14T13:58:23.555996Z", "title": "Packages available in excluded repositories will not be installed"}], "leapp_run_id": "0c32378d-97a0-4cd6-be5f-eb1fc7e09140"}, "leapp_report_txt": ["Risk Factor: high (error)", "Title: A subscription-manager command failed to execute", "Summary: {\"link\": \"https://access.redhat.com/solutions/6138372\", \"details\": \"Command ['subscription-manager', 'release'] failed with exit code 1.\", \"stderr\": \"This system is not yet registered. Try 'subscription-manager register --help' for more information.\\n\", \"hint\": \"Please ensure you have a valid RHEL subscription and your network is up. If you are using proxy for Red Hat subscription-manager, please make sure it is specified inside the /etc/rhsm/rhsm.conf file. Or use the --no-rhsm option when running leapp, if you do not want to use subscription-manager for the in-place upgrade and you want to deliver all target repositories by yourself or using RHUI on public cloud.\"}", "Key: 7ec8269784db1bba2ac54ae438689ef397e16833", "----------------------------------------", "Risk Factor: high ", "Title: Packages available in excluded repositories will not be installed", "Summary: 2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.", "The list of these packages:", "- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", "- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", "Key: 2437e204808f987477c0e9be8e4c95b3a87a9f3e", "----------------------------------------", "Risk Factor: info ", "Title: Excluded target system repositories", "Summary: The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.", "- codeready-builder-beta-for-rhel-8-s390x-rpms", "- codeready-builder-beta-for-rhel-8-ppc64le-rpms", "- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms", "- codeready-builder-for-rhel-8-aarch64-eus-rpms", "- codeready-builder-for-rhel-8-ppc64le-eus-rpms", "- codeready-builder-beta-for-rhel-8-x86_64-rpms", "- codeready-builder-for-rhel-8-aarch64-rpms", "- codeready-builder-for-rhel-8-s390x-rpms", "- codeready-builder-for-rhel-8-s390x-eus-rpms", "- codeready-builder-for-rhel-8-x86_64-eus-rpms", "- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms", "- codeready-builder-beta-for-rhel-8-aarch64-rpms", "- codeready-builder-for-rhel-8-rhui-rpms", "- codeready-builder-for-rhel-8-x86_64-rhui-rpms", "- codeready-builder-for-rhel-8-x86_64-rpms", "- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms", "- codeready-builder-for-rhel-8-ppc64le-rpms", "Remediation: [hint] If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "Key: 1b9132cb2362ae7830e48eee7811be9527747de8", "----------------------------------------", ""]}, "changed": false} TASK [infra.leapp.common : parse_leapp_report | Check for inhibitors] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:32 ok: [managed-node01] => (item={'groups': ['error'], 'title': 'A subscription-manager command failed to execute', 'timeStamp': '2025-11-14T13:58:04.707243Z', 'hostname': 'managed-node01', 'actor': 'scan_subscription_manager_info', 'summary': '{"link": "https://access.redhat.com/solutions/6138372", "details": "Command [\'subscription-manager\', \'release\'] failed with exit code 1.", "stderr": "This system is not yet registered. Try \'subscription-manager register --help\' for more information.\\n", "hint": "Please ensure you have a valid RHEL subscription and your network is up. If you are using proxy for Red Hat subscription-manager, please make sure it is specified inside the /etc/rhsm/rhsm.conf file. Or use the --no-rhsm option when running leapp, if you do not want to use subscription-manager for the in-place upgrade and you want to deliver all target repositories by yourself or using RHUI on public cloud."}', 'audience': 'sysadmin', 'key': '7ec8269784db1bba2ac54ae438689ef397e16833', 'id': 'f89c0dca84cf4dd35f5017adc0c522836598d8ecda31c7abd46ffdb5d8cec6f8', 'severity': 'high'}) => {"ansible_facts": {"leapp_inhibitors": [{"actor": "scan_subscription_manager_info", "audience": "sysadmin", "groups": ["error"], "hostname": "managed-node01", "id": "f89c0dca84cf4dd35f5017adc0c522836598d8ecda31c7abd46ffdb5d8cec6f8", "key": "7ec8269784db1bba2ac54ae438689ef397e16833", "severity": "high", "summary": "{\"link\": \"https://access.redhat.com/solutions/6138372\", \"details\": \"Command ['subscription-manager', 'release'] failed with exit code 1.\", \"stderr\": \"This system is not yet registered. Try 'subscription-manager register --help' for more information.\\n\", \"hint\": \"Please ensure you have a valid RHEL subscription and your network is up. If you are using proxy for Red Hat subscription-manager, please make sure it is specified inside the /etc/rhsm/rhsm.conf file. Or use the --no-rhsm option when running leapp, if you do not want to use subscription-manager for the in-place upgrade and you want to deliver all target repositories by yourself or using RHUI on public cloud.\"}", "timeStamp": "2025-11-14T13:58:04.707243Z", "title": "A subscription-manager command failed to execute"}], "upgrade_inhibited": true}, "ansible_loop_var": "item", "changed": false, "item": {"actor": "scan_subscription_manager_info", "audience": "sysadmin", "groups": ["error"], "hostname": "managed-node01", "id": "f89c0dca84cf4dd35f5017adc0c522836598d8ecda31c7abd46ffdb5d8cec6f8", "key": "7ec8269784db1bba2ac54ae438689ef397e16833", "severity": "high", "summary": "{\"link\": \"https://access.redhat.com/solutions/6138372\", \"details\": \"Command ['subscription-manager', 'release'] failed with exit code 1.\", \"stderr\": \"This system is not yet registered. Try 'subscription-manager register --help' for more information.\\n\", \"hint\": \"Please ensure you have a valid RHEL subscription and your network is up. If you are using proxy for Red Hat subscription-manager, please make sure it is specified inside the /etc/rhsm/rhsm.conf file. Or use the --no-rhsm option when running leapp, if you do not want to use subscription-manager for the in-place upgrade and you want to deliver all target repositories by yourself or using RHUI on public cloud.\"}", "timeStamp": "2025-11-14T13:58:04.707243Z", "title": "A subscription-manager command failed to execute"}} skipping: [managed-node01] => (item={'groups': ['repository', 'failure'], 'title': 'Excluded target system repositories', 'timeStamp': '2025-11-14T13:58:21.227845Z', 'hostname': 'managed-node01', 'detail': {'remediations': [{'type': 'hint', 'context': 'If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).'}]}, 'actor': 'repositories_blacklist', 'summary': 'The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms', 'audience': 'sysadmin', 'key': '1b9132cb2362ae7830e48eee7811be9527747de8', 'id': 'e3e37361be5d50602f10b77be733290dd434845a98574ae0a4c50c977de58578', 'severity': 'info'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "repositories_blacklist", "audience": "sysadmin", "detail": {"remediations": [{"context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "type": "hint"}]}, "groups": ["repository", "failure"], "hostname": "managed-node01", "id": "e3e37361be5d50602f10b77be733290dd434845a98574ae0a4c50c977de58578", "key": "1b9132cb2362ae7830e48eee7811be9527747de8", "severity": "info", "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms", "timeStamp": "2025-11-14T13:58:21.227845Z", "title": "Excluded target system repositories"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['repository'], 'title': 'Packages available in excluded repositories will not be installed', 'timeStamp': '2025-11-14T13:58:23.555996Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'python3-pyxattr'}, {'scheme': 'package', 'title': 'rpcgen'}]}, 'actor': 'pes_events_scanner', 'summary': '2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled "Excluded target system repositories" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)', 'audience': 'sysadmin', 'key': '2437e204808f987477c0e9be8e4c95b3a87a9f3e', 'id': '5dba576783a55b023490053e0aa777d6b7a713829484e3a9527b75f8e6086647', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "pes_events_scanner", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "python3-pyxattr"}, {"scheme": "package", "title": "rpcgen"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "5dba576783a55b023490053e0aa777d6b7a713829484e3a9527b75f8e6086647", "key": "2437e204808f987477c0e9be8e4c95b3a87a9f3e", "severity": "high", "summary": "2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", "timeStamp": "2025-11-14T13:58:23.555996Z", "title": "Packages available in excluded repositories will not be installed"}, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : parse_leapp_report | Collect inhibitors] ************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:44 ok: [managed-node01] => {"changed": false, "cmd": ["awk", "/\\(inhibitor\\)/,/^-------/", "/var/log/leapp/leapp-report.txt"], "delta": "0:00:00.003286", "end": "2025-11-14 08:58:46.953507", "failed_when_result": false, "msg": "", "rc": 0, "start": "2025-11-14 08:58:46.950221", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} TASK [infra.leapp.common : parse_leapp_report | Collect high errors] *********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:53 ok: [managed-node01] => {"changed": false, "cmd": ["awk", "/high \\(error\\)/,/^-------/", "/var/log/leapp/leapp-report.txt"], "delta": "0:00:00.003489", "end": "2025-11-14 08:58:47.229338", "failed_when_result": false, "msg": "", "rc": 0, "start": "2025-11-14 08:58:47.225849", "stderr": "", "stderr_lines": [], "stdout": "Risk Factor: high (error)\nTitle: A subscription-manager command failed to execute\nSummary: {\"link\": \"https://access.redhat.com/solutions/6138372\", \"details\": \"Command ['subscription-manager', 'release'] failed with exit code 1.\", \"stderr\": \"This system is not yet registered. Try 'subscription-manager register --help' for more information.\\n\", \"hint\": \"Please ensure you have a valid RHEL subscription and your network is up. If you are using proxy for Red Hat subscription-manager, please make sure it is specified inside the /etc/rhsm/rhsm.conf file. Or use the --no-rhsm option when running leapp, if you do not want to use subscription-manager for the in-place upgrade and you want to deliver all target repositories by yourself or using RHUI on public cloud.\"}\nKey: 7ec8269784db1bba2ac54ae438689ef397e16833\n----------------------------------------", "stdout_lines": ["Risk Factor: high (error)", "Title: A subscription-manager command failed to execute", "Summary: {\"link\": \"https://access.redhat.com/solutions/6138372\", \"details\": \"Command ['subscription-manager', 'release'] failed with exit code 1.\", \"stderr\": \"This system is not yet registered. Try 'subscription-manager register --help' for more information.\\n\", \"hint\": \"Please ensure you have a valid RHEL subscription and your network is up. If you are using proxy for Red Hat subscription-manager, please make sure it is specified inside the /etc/rhsm/rhsm.conf file. Or use the --no-rhsm option when running leapp, if you do not want to use subscription-manager for the in-place upgrade and you want to deliver all target repositories by yourself or using RHUI on public cloud.\"}", "Key: 7ec8269784db1bba2ac54ae438689ef397e16833", "----------------------------------------"]} TASK [infra.leapp.upgrade : leapp-upgrade | Display inhibitors] **************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/upgrade/tasks/leapp-upgrade.yml:102 skipping: [managed-node01] => {} TASK [infra.leapp.upgrade : leapp-upgrade | Display errors] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/upgrade/tasks/leapp-upgrade.yml:107 ok: [managed-node01] => { "results_errors.stdout_lines": [ "Risk Factor: high (error)", "Title: A subscription-manager command failed to execute", "Summary: {\"link\": \"https://access.redhat.com/solutions/6138372\", \"details\": \"Command ['subscription-manager', 'release'] failed with exit code 1.\", \"stderr\": \"This system is not yet registered. Try 'subscription-manager register --help' for more information.\\n\", \"hint\": \"Please ensure you have a valid RHEL subscription and your network is up. If you are using proxy for Red Hat subscription-manager, please make sure it is specified inside the /etc/rhsm/rhsm.conf file. Or use the --no-rhsm option when running leapp, if you do not want to use subscription-manager for the in-place upgrade and you want to deliver all target repositories by yourself or using RHUI on public cloud.\"}", "Key: 7ec8269784db1bba2ac54ae438689ef397e16833", "----------------------------------------" ] } TASK [infra.leapp.upgrade : leapp-upgrade | Fail Leapp upgrade] **************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/upgrade/tasks/leapp-upgrade.yml:112 fatal: [managed-node01]: FAILED! => {"changed": false, "msg": "Errors encountered running Leapp upgrade command. Review the tasks above or the result file at /var/log/leapp/leapp-report.txt."} TASK [Test | Check error] ****************************************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/upgrade/tests/tests_default.yml:14 ok: [managed-node01] => { "msg": "errors {\n \"_ansible_no_log\": false,\n \"changed\": false,\n \"failed\": true,\n \"msg\": \"Errors encountered running Leapp upgrade command. Review the tasks above or the result file at /var/log/leapp/leapp-report.txt.\"\n}" } TASK [Test | Ensure correct error] ********************************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/upgrade/tests/tests_default.yml:18 ok: [managed-node01] => { "changed": false, "msg": "All assertions passed" } RUNNING HANDLER [infra.leapp.common : Check for log file] ********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:3 ok: [managed-node01] => {"changed": false, "stat": {"atime": 1763128468.985372, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 24, "charset": "us-ascii", "checksum": "139220dd6aa2c55ea2d60a6e9fe5ec2cc7bf5eba", "ctime": 1763128704.1640947, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 499122277, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1763128704.1640947, "nlink": 1, "path": "/var/log/ripu/ripu.log", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 9480, "uid": 0, "version": "18446744072354733494", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} RUNNING HANDLER [infra.leapp.common : Add end time to log file] **************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:9 changed: [managed-node01] => {"backup": "", "changed": true, "msg": "line added"} RUNNING HANDLER [infra.leapp.common : Slurp ripu.log file] ********************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:19 ok: [managed-node01] => {"changed": false, "content": "RIPU in-place OS upgrade
Job started at 2025-11-14T13:54:28Z
==> Processing phase `configuration_phase`
====> * ipu_workflow_config
        IPU workflow config actor
==> Processing phase `FactsCollection`
====> * get_enabled_modules
        Provides data about which module streams are enabled on the source system.
====> * removed_pam_modules_scanner
        Scan PAM configuration for modules that are not available in RHEL-8.
====> * scanzfcp
        In case of s390x architecture, check whether ZFCP is used.
====> * scan_kernel_cmdline
        No documentation has been provided for the scan_kernel_cmdline actor.
====> * system_facts
        Provides data about many facts from system.
====> * pam_modules_scanner
        Scan the pam directory for services and modules used in them
====> * repository_mapping
        Produces message containing repository mapping based on provided file.
====> * firewalld_facts_actor
        Provide data about firewalld
====> * root_scanner
        Scan the system root directory and produce a message containing
====> * check_grub_legacy
        Check whether GRUB Legacy is installed in the MBR.
====> * scanclienablerepo
        Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.
====> * scan_files_for_target_userspace
        Scan the source system and identify files that will be copied into the target userspace when it is created.
====> * rpm_scanner
        Provides data about installed RPM Packages.
Loaded plugins: product-id, subscription-manager

This system is not registered with an entitlement server. You can use subscription-manager to register.

====> * authselect_scanner
        Detect what authselect configuration should be suggested to administrator.
====> * transaction_workarounds
        Provides additional RPM transaction tasks based on bundled RPM packages.
====> * scan_grub_config
        Scan grub configuration files for errors.
====> * register_yum_adjustment
        Registers a workaround which will adjust the yum directories during the upgrade.
====> * common_leapp_dracut_modules
        Influences the generation of the initram disk
====> * scan_custom_modifications_actor
        Collects information about files in leapp directories that have been modified or newly added.
====> * scan_subscription_manager_info
        Scans the current system for subscription manager information
====> * scan_target_os_image
        Scans the provided target OS ISO image to use as a content source for the IPU, if any.
====> * load_device_driver_deprecation_data
        Loads deprecation data for drivers and devices (PCI & CPU)
====> * scandasd
        In case of s390x architecture, check whether DASD is used.
====> * scan_custom_repofile
        Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.
====> * sssd_facts
        Check SSSD configuration for changes in RHEL8 and report them in model.
====> * read_openssh_config
        Collect information about the OpenSSH configuration.
====> * scanmemory
        Scan Memory of the machine.
====> * scan_fips
        Determine whether the source system has FIPS enabled.
====> * source_boot_loader_scanner
        Scans the boot loader configuration on the source system.
====> * detect_kernel_drivers
        Matches all currently loaded kernel drivers against known deprecated and removed drivers.
====> * pci_devices_scanner
        Provides data about existing PCI Devices.
====> * persistentnetnames
        Get network interface information for physical ethernet interfaces of the original system.
====> * distribution_signed_rpm_scanner
        Provide data about distribution signed & unsigned RPM packages.
====> * checkrhui
        Check if system is using RHUI infrastructure (on public cloud) and send messages to
====> * scan_grub_device_name
        Find the name of the block devices where GRUB is located
====> * udevadm_info
        Produces data exported by the "udevadm info" command.
====> * selinuxcontentscanner
        Scan the system for any SELinux customizations
====> * persistentnetnamesdisable
        Disable systemd-udevd persistent network naming on machine with single eth0 NIC
====> * tcp_wrappers_config_read
        Parse tcp_wrappers configuration files /etc/hosts.{allow,deny}.
====> * copy_dnf_conf_into_target_userspace
        Copy dnf.conf into target userspace
====> * scan_pkg_manager
        Provides data about package manager (yum/dnf)
====> * network_manager_read_config
        Provides data about NetworkManager configuration.
====> * sctp_read_status
        Determines whether or not the SCTP kernel module might be wanted.
====> * scan_sap_hana
        Gathers information related to SAP HANA instances on the system.
====> * remove_obsolete_gpg_keys
        Remove obsoleted RPM GPG keys.
====> * scan_source_files
        Scan files (explicitly specified) of the source system.
====> * spamassassin_config_read
        Reads spamc configuration (/etc/mail/spamassassin/spamc.conf), the
====> * multipath_conf_read
        Read multipath configuration files and extract the necessary information
====> * storage_scanner
        Provides data about storage settings.
====> * quagga_daemons
        Active quagga daemons check.
====> * scan_source_kernel
        Scan the source system kernel.
====> * check_kde_apps
        Actor checks which KDE apps are installed.
====> * get_installed_desktops
        Actor checks if kde or gnome desktop environments
====> * scan_systemd_source
        Provides info about systemd on the source system
====> * scancpu
        Scan CPUs of the machine.
====> * used_repository_scanner
        Scan used enabled repositories
====> * repositories_blacklist
        Exclude target repositories provided by Red Hat without support.
====> * trusted_gpg_keys_scanner
        Scan for trusted GPG keys.
====> * scan_grub_device_partition_layout
        Scan all identified GRUB devices for their partition layout.
====> * satellite_upgrade_facts
        Report which Satellite packages require updates and how to handle PostgreSQL data
====> * cups_scanner
        Gather facts about CUPS features which needs to be migrated
====> * rpm_transaction_config_tasks_collector
        Provides additional RPM transaction tasks from /etc/leapp/transaction.
====> * ipa_scanner
        Scan system for ipa-client and ipa-server status
====> * xfs_info_scanner
        This actor scans all mounted mountpoints for XFS information
====> * biosdevname
        Enable biosdevname on the target RHEL system if all interfaces on the source RHEL
====> * scan_dynamic_linker_configuration
        Scan the dynamic linker configuration and find modifications.
====> * vsftpd_config_read
        Reads vsftpd configuration files (/etc/vsftpd/*.conf) and extracts necessary information.
====> * pes_events_scanner
        Provides data about package events from Package Evolution Service.
====> * setuptargetrepos
        Produces list of repositories that should be available to be used by Upgrade process.

============================================================
                           ERRORS                           
============================================================

2025-11-14 08:58:04.707032 [ERROR] Actor: scan_subscription_manager_info
Message: A subscription-manager command failed to execute
Summary:
    Link: https://access.redhat.com/solutions/6138372
    Details: Command ['subscription-manager', 'release'] failed with exit code 1.
    Stderr: This system is not yet registered. Try 'subscription-manager register --help' for more information.
    Hint: Please ensure you have a valid RHEL subscription and your network is up. If you are using proxy for Red Hat subscription-manager, please make sure it is specified inside the /etc/rhsm/rhsm.conf file. Or use the --no-rhsm option when running leapp, if you do not want to use subscription-manager for the in-place upgrade and you want to deliver all target repositories by yourself or using RHUI on public cloud.

============================================================
                       END OF ERRORS                        
============================================================

Debug output written to /var/log/leapp/leapp-upgrade.log

============================================================
                      REPORT OVERVIEW                       
============================================================

Following errors occurred and the upgrade cannot continue:
    1. Actor: scan_subscription_manager_info
       Message: A subscription-manager command failed to execute

HIGH and MEDIUM severity reports:
    1. Packages available in excluded repositories will not be installed

Reports summary:
    Errors:                      1
    Inhibitors:                  0
    HIGH severity reports:       1
    MEDIUM severity reports:     0
    LOW severity reports:        0
    INFO severity reports:       1

Before continuing, review the full report below for details about discovered problems and possible remediation instructions:
    A report has been generated at /var/log/leapp/leapp-report.txt
    A report has been generated at /var/log/leapp/leapp-report.json

============================================================
                   END OF REPORT OVERVIEW                   
============================================================

Answerfile has been generated at /var/log/leapp/answerfile
Job ended at 2025-11-14T13:58:47Z
", "encoding": "base64", "source": "/var/log/ripu/ripu.log"} RUNNING HANDLER [infra.leapp.common : Decode ripu.log file] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:26 ok: [managed-node01] => {"ansible_facts": {"ripu_log_file": ["RIPU in-place OS upgrade", "Job started at 2025-11-14T13:54:28Z", "==> Processing phase `configuration_phase`", "====> * ipu_workflow_config", " IPU workflow config actor", "==> Processing phase `FactsCollection`", "====> * get_enabled_modules", " Provides data about which module streams are enabled on the source system.", "====> * removed_pam_modules_scanner", " Scan PAM configuration for modules that are not available in RHEL-8.", "====> * scanzfcp", " In case of s390x architecture, check whether ZFCP is used.", "====> * scan_kernel_cmdline", " No documentation has been provided for the scan_kernel_cmdline actor.", "====> * system_facts", " Provides data about many facts from system.", "====> * pam_modules_scanner", " Scan the pam directory for services and modules used in them", "====> * repository_mapping", " Produces message containing repository mapping based on provided file.", "====> * firewalld_facts_actor", " Provide data about firewalld", "====> * root_scanner", " Scan the system root directory and produce a message containing", "====> * check_grub_legacy", " Check whether GRUB Legacy is installed in the MBR.", "====> * scanclienablerepo", " Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.", "====> * scan_files_for_target_userspace", " Scan the source system and identify files that will be copied into the target userspace when it is created.", "====> * rpm_scanner", " Provides data about installed RPM Packages.", "Loaded plugins: product-id, subscription-manager", "", "This system is not registered with an entitlement server. You can use subscription-manager to register.", "", "====> * authselect_scanner", " Detect what authselect configuration should be suggested to administrator.", "====> * transaction_workarounds", " Provides additional RPM transaction tasks based on bundled RPM packages.", "====> * scan_grub_config", " Scan grub configuration files for errors.", "====> * register_yum_adjustment", " Registers a workaround which will adjust the yum directories during the upgrade.", "====> * common_leapp_dracut_modules", " Influences the generation of the initram disk", "====> * scan_custom_modifications_actor", " Collects information about files in leapp directories that have been modified or newly added.", "====> * scan_subscription_manager_info", " Scans the current system for subscription manager information", "====> * scan_target_os_image", " Scans the provided target OS ISO image to use as a content source for the IPU, if any.", "====> * load_device_driver_deprecation_data", " Loads deprecation data for drivers and devices (PCI & CPU)", "====> * scandasd", " In case of s390x architecture, check whether DASD is used.", "====> * scan_custom_repofile", " Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.", "====> * sssd_facts", " Check SSSD configuration for changes in RHEL8 and report them in model.", "====> * read_openssh_config", " Collect information about the OpenSSH configuration.", "====> * scanmemory", " Scan Memory of the machine.", "====> * scan_fips", " Determine whether the source system has FIPS enabled.", "====> * source_boot_loader_scanner", " Scans the boot loader configuration on the source system.", "====> * detect_kernel_drivers", " Matches all currently loaded kernel drivers against known deprecated and removed drivers.", "====> * pci_devices_scanner", " Provides data about existing PCI Devices.", "====> * persistentnetnames", " Get network interface information for physical ethernet interfaces of the original system.", "====> * distribution_signed_rpm_scanner", " Provide data about distribution signed & unsigned RPM packages.", "====> * checkrhui", " Check if system is using RHUI infrastructure (on public cloud) and send messages to", "====> * scan_grub_device_name", " Find the name of the block devices where GRUB is located", "====> * udevadm_info", " Produces data exported by the \"udevadm info\" command.", "====> * selinuxcontentscanner", " Scan the system for any SELinux customizations", "====> * persistentnetnamesdisable", " Disable systemd-udevd persistent network naming on machine with single eth0 NIC", "====> * tcp_wrappers_config_read", " Parse tcp_wrappers configuration files /etc/hosts.{allow,deny}.", "====> * copy_dnf_conf_into_target_userspace", " Copy dnf.conf into target userspace", "====> * scan_pkg_manager", " Provides data about package manager (yum/dnf)", "====> * network_manager_read_config", " Provides data about NetworkManager configuration.", "====> * sctp_read_status", " Determines whether or not the SCTP kernel module might be wanted.", "====> * scan_sap_hana", " Gathers information related to SAP HANA instances on the system.", "====> * remove_obsolete_gpg_keys", " Remove obsoleted RPM GPG keys.", "====> * scan_source_files", " Scan files (explicitly specified) of the source system.", "====> * spamassassin_config_read", " Reads spamc configuration (/etc/mail/spamassassin/spamc.conf), the", "====> * multipath_conf_read", " Read multipath configuration files and extract the necessary information", "====> * storage_scanner", " Provides data about storage settings.", "====> * quagga_daemons", " Active quagga daemons check.", "====> * scan_source_kernel", " Scan the source system kernel.", "====> * check_kde_apps", " Actor checks which KDE apps are installed.", "====> * get_installed_desktops", " Actor checks if kde or gnome desktop environments", "====> * scan_systemd_source", " Provides info about systemd on the source system", "====> * scancpu", " Scan CPUs of the machine.", "====> * used_repository_scanner", " Scan used enabled repositories", "====> * repositories_blacklist", " Exclude target repositories provided by Red Hat without support.", "====> * trusted_gpg_keys_scanner", " Scan for trusted GPG keys.", "====> * scan_grub_device_partition_layout", " Scan all identified GRUB devices for their partition layout.", "====> * satellite_upgrade_facts", " Report which Satellite packages require updates and how to handle PostgreSQL data", "====> * cups_scanner", " Gather facts about CUPS features which needs to be migrated", "====> * rpm_transaction_config_tasks_collector", " Provides additional RPM transaction tasks from /etc/leapp/transaction.", "====> * ipa_scanner", " Scan system for ipa-client and ipa-server status", "====> * xfs_info_scanner", " This actor scans all mounted mountpoints for XFS information", "====> * biosdevname", " Enable biosdevname on the target RHEL system if all interfaces on the source RHEL", "====> * scan_dynamic_linker_configuration", " Scan the dynamic linker configuration and find modifications.", "====> * vsftpd_config_read", " Reads vsftpd configuration files (/etc/vsftpd/*.conf) and extracts necessary information.", "====> * pes_events_scanner", " Provides data about package events from Package Evolution Service.", "====> * setuptargetrepos", " Produces list of repositories that should be available to be used by Upgrade process.", "", "============================================================", " ERRORS ", "============================================================", "", "2025-11-14 08:58:04.707032 [ERROR] Actor: scan_subscription_manager_info", "Message: A subscription-manager command failed to execute", "Summary:", " Link: https://access.redhat.com/solutions/6138372", " Details: Command ['subscription-manager', 'release'] failed with exit code 1.", " Stderr: This system is not yet registered. Try 'subscription-manager register --help' for more information.", " Hint: Please ensure you have a valid RHEL subscription and your network is up. If you are using proxy for Red Hat subscription-manager, please make sure it is specified inside the /etc/rhsm/rhsm.conf file. Or use the --no-rhsm option when running leapp, if you do not want to use subscription-manager for the in-place upgrade and you want to deliver all target repositories by yourself or using RHUI on public cloud.", "", "============================================================", " END OF ERRORS ", "============================================================", "", "Debug output written to /var/log/leapp/leapp-upgrade.log", "", "============================================================", " REPORT OVERVIEW ", "============================================================", "", "Following errors occurred and the upgrade cannot continue:", " 1. Actor: scan_subscription_manager_info", " Message: A subscription-manager command failed to execute", "", "HIGH and MEDIUM severity reports:", " 1. Packages available in excluded repositories will not be installed", "", "Reports summary:", " Errors: 1", " Inhibitors: 0", " HIGH severity reports: 1", " MEDIUM severity reports: 0", " LOW severity reports: 0", " INFO severity reports: 1", "", "Before continuing, review the full report below for details about discovered problems and possible remediation instructions:", " A report has been generated at /var/log/leapp/leapp-report.txt", " A report has been generated at /var/log/leapp/leapp-report.json", "", "============================================================", " END OF REPORT OVERVIEW ", "============================================================", "", "Answerfile has been generated at /var/log/leapp/answerfile", "Job ended at 2025-11-14T13:58:47Z", ""]}, "changed": false} RUNNING HANDLER [infra.leapp.common : Rename log file] ************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:32 changed: [managed-node01] => {"changed": true, "cmd": "export PATH=$PATH\nmv /var/log/ripu/ripu.log /var/log/ripu/ripu.log-20251114T085427\n", "delta": "0:00:00.003967", "end": "2025-11-14 08:58:48.656906", "msg": "", "rc": 0, "start": "2025-11-14 08:58:48.652939", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} PLAY RECAP ********************************************************************* managed-node01 : ok=29 changed=6 unreachable=0 failed=0 skipped=12 rescued=2 ignored=0