[WARNING]: Collection infra.leapp does not support Ansible version 2.14.18 [WARNING]: running playbook inside collection infra.leapp ansible-playbook [core 2.14.18] config file = /etc/ansible/ansible.cfg configured module search path = ['/root/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] ansible python module location = /usr/lib/python3.9/site-packages/ansible ansible collection location = /root/.ansible/collections:/usr/share/ansible/collections executable location = /usr/bin/ansible-playbook python version = 3.9.25 (main, Nov 10 2025, 00:00:00) [GCC 11.5.0 20240719 (Red Hat 11.5.0-11)] (/usr/bin/python3) jinja version = 3.1.2 libyaml = True Using /etc/ansible/ansible.cfg as config file Skipping callback 'default', as we already have a stdout callback. Skipping callback 'minimal', as we already have a stdout callback. Skipping callback 'oneline', as we already have a stdout callback. PLAYBOOK: tests_remediations_9to10.yml ***************************************** 1 plays in /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_remediations_9to10.yml PLAY [Test RHEL 9 to 10 remediations] ****************************************** TASK [Gathering Facts] ********************************************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_remediations_9to10.yml:2 ok: [managed-node01] TASK [Include tests_upgrade_custom playbook] *********************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_remediations_9to10.yml:22 included: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/tests_upgrade_custom.yml for managed-node01 TASK [tests_upgrade_custom | Check if leapp upgrade log exists] **************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/tests_upgrade_custom.yml:12 ok: [managed-node01] => {"changed": false, "stat": {"exists": false}} TASK [tests_upgrade_custom | Skip test if already upgraded or not RHEL {{ rhel_base_ver }}] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/tests_upgrade_custom.yml:17 META: end_play conditional evaluated to False, continuing play skipping: [managed-node01] => {"msg": "end_play", "skip_reason": "end_play conditional evaluated to False, continuing play"} TASK [tests_upgrade_custom | Include common upgrade tasks] ********************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/tests_upgrade_custom.yml:27 included: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml for managed-node01 TASK [common_upgrade_tasks | Remove leapp packages] **************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:6 changed: [managed-node01] => {"changed": true, "msg": "", "rc": 0, "results": ["Removed: leapp-upgrade-el9toel10-0.23.0-1.el9.noarch"]} TASK [common_upgrade_tasks | Gather setup tasks] ******************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:11 ok: [managed-node01 -> localhost] => {"changed": false, "examined": 3, "files": [{"atime": 1768226097.8323016, "ctime": 1768226097.5623047, "dev": 51716, "gid": 0, "gr_name": "root", "inode": 176160909, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1768226097.5623047, "nlink": 1, "path": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_cifs.yml", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 272, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}, {"atime": 1768226097.8323016, "ctime": 1768226097.5623047, "dev": 51716, "gid": 0, "gr_name": "root", "inode": 176160910, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1768226097.5623047, "nlink": 1, "path": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_removed_kernel_drivers.yml", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 913, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}, {"atime": 1768226097.8323016, "ctime": 1768226097.5623047, "dev": 51716, "gid": 0, "gr_name": "root", "inode": 176160911, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1768226097.5623047, "nlink": 1, "path": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/version_lock.yml", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 539, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}], "matched": 3, "msg": "All paths examined", "skipped_paths": {}} TASK [common_upgrade_tasks | Do remediation setup tasks] *********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:18 included: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_cifs.yml for managed-node01 => (item=/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_cifs.yml) included: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_removed_kernel_drivers.yml for managed-node01 => (item=/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_removed_kernel_drivers.yml) TASK [setup | remediate_cifs | Add a CIFS share to /etc/fstab] ***************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_cifs.yml:3 changed: [managed-node01] => {"backup": "", "changed": true, "msg": "line added"} TASK [setup | remediate_removed_kernel_drivers | Set list of test kernel modules] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_removed_kernel_drivers.yml:4 ok: [managed-node01] => {"ansible_facts": {"leapp_test_kernel_modules": ["qla3xxx", "vmw_pvrdma"]}, "changed": false} TASK [setup | remediate_removed_kernel_drivers | Load the test kernel modules] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_removed_kernel_drivers.yml:21 TASK [infra.leapp.common : manage_kernel_modules | Load or unload kernel modules] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_kernel_modules.yml:5 [WARNING]: Collection community.general does not support Ansible version 2.14.18 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml for managed-node01 => (item=qla3xxx) included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml for managed-node01 => (item=vmw_pvrdma) TASK [infra.leapp.common : manage_one_kernel_module | Load or unload kernel module] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:5 changed: [managed-node01] => {"changed": true, "name": "qla3xxx", "params": "", "state": "present"} TASK [infra.leapp.common : manage_one_kernel_module | Disable modules-load.d file entry] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:17 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : manage_one_kernel_module | Ensure modules are not loaded at boot] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:25 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : manage_one_kernel_module | Debug modprobe.d file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:33 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : manage_one_kernel_module | Debug modules-load.d file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:37 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : manage_one_kernel_module | Load or unload kernel module] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:5 changed: [managed-node01] => {"changed": true, "name": "vmw_pvrdma", "params": "", "state": "present"} TASK [infra.leapp.common : manage_one_kernel_module | Disable modules-load.d file entry] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:17 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : manage_one_kernel_module | Ensure modules are not loaded at boot] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:25 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : manage_one_kernel_module | Debug modprobe.d file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:33 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : manage_one_kernel_module | Debug modules-load.d file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:37 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [common_upgrade_tasks | Do setup tasks] *********************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:29 skipping: [managed-node01] => (item=/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/version_lock.yml) => {"ansible_loop_var": "setup_task_file", "changed": false, "setup_task_file": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/version_lock.yml", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => {"changed": false, "msg": "All items skipped"} TASK [common_upgrade_tasks | Run first analysis] ******************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:40 TASK [infra.leapp.common : Log directory exists] ******************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:3 ok: [managed-node01] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/var/log/ripu", "secontext": "unconfined_u:object_r:var_log_t:s0", "size": 6, "state": "directory", "uid": 0} TASK [infra.leapp.common : Check for existing log file] ************************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:11 ok: [managed-node01] => {"changed": false, "stat": {"exists": false}} TASK [infra.leapp.common : Fail if log file already exists] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:16 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : Create new log file] ******************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:23 NOTIFIED HANDLER infra.leapp.common : Check for log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Add end time to log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Slurp ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Decode ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Rename log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Check for log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Add end time to log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Slurp ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Decode ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Rename log file for managed-node01 changed: [managed-node01] => {"changed": true, "checksum": "cc71e69ca20212199dbcd383a4f4415e39d256ca", "dest": "/var/log/ripu/ripu.log", "gid": 0, "group": "root", "md5sum": "e09277d14d16cabddf254805ecabd611", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:var_log_t:s0", "size": 61, "src": "/root/.ansible/tmp/ansible-tmp-1768226251.793919-7704-225812604714046/source", "state": "file", "uid": 0} TASK [infra.leapp.common : /etc/ansible/facts.d directory exists] ************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:35 ok: [managed-node01] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc/ansible/facts.d", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 57, "state": "directory", "uid": 0} TASK [infra.leapp.common : Capture current ansible_facts for validation after upgrade] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:43 changed: [managed-node01] => {"changed": true, "checksum": "33497605aefd908d1b9a53932fa84443d8876045", "dest": "/etc/ansible/facts.d/pre_ripu.fact", "gid": 0, "group": "root", "md5sum": "b85fb19c1755963c57a6032a4e12a041", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:etc_t:s0", "size": 14276, "src": "/root/.ansible/tmp/ansible-tmp-1768226253.0674343-7797-228080463339840/source", "state": "file", "uid": 0} TASK [infra.leapp.common : Capture a list of non-rhel versioned packages] ****** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:51 ok: [managed-node01] => {"changed": false, "cmd": "set -o pipefail; export PATH=$PATH; rpm -qa | grep -ve '[\\.|+]el9' | grep -vE '^(gpg-pubkey|libmodulemd|katello-ca-consumer)' | sort", "delta": "0:00:00.184368", "end": "2026-01-12 08:57:34.319117", "failed_when_result": false, "msg": "non-zero return code", "rc": 1, "start": "2026-01-12 08:57:34.134749", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} TASK [infra.leapp.common : Create fact with the non-rhel versioned packages list] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:65 ok: [managed-node01] => {"ansible_facts": {"non_rhel_packages": []}, "changed": false} TASK [infra.leapp.common : Capture the list of non-rhel versioned packages in a separate fact file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:69 ok: [managed-node01] => {"changed": false, "checksum": "97d170e1550eee4afc0af065b78cda302a97674c", "dest": "/etc/ansible/facts.d/non_rhel_packages.fact", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/ansible/facts.d/non_rhel_packages.fact", "secontext": "system_u:object_r:etc_t:s0", "size": 2, "state": "file", "uid": 0} TASK [infra.leapp.analysis : Include tasks for preupg assistant analysis] ****** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:9 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : Include tasks for leapp preupgrade analysis] ****** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:13 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml for managed-node01 TASK [infra.leapp.analysis : analysis-leapp | Register to leapp activation key] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:2 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [analysis-leapp | Include custom_local_repos for local_repos_pre_leapp] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:14 TASK [infra.leapp.common : custom_local_repos | Remove old /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:2 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : custom_local_repos | Enable custom upgrade yum repositories] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:9 skipping: [managed-node01] => {"changed": false, "skipped_reason": "No items in the list"} TASK [infra.leapp.analysis : analysis-leapp | Install packages for preupgrade analysis on RHEL 7] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:22 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : analysis-leapp | Install packages for preupgrade analysis on RHEL 8] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:29 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : analysis-leapp | Install packages for preupgrade analysis on RHEL 9] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:36 changed: [managed-node01] => {"changed": true, "msg": "", "rc": 0, "results": ["Installed: leapp-upgrade-el9toel10-0.23.0-1.el9.noarch"]} TASK [infra.leapp.analysis : analysis-leapp | Ensure leapp log directory exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:43 ok: [managed-node01] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/var/log/leapp", "secontext": "system_u:object_r:var_log_t:s0", "size": 146, "state": "directory", "uid": 0} TASK [infra.leapp.analysis : analysis-leapp | Populate leapp_answers file] ***** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:51 changed: [managed-node01] => {"changed": true, "checksum": "3d934ad808576e3a7fb4c14a89645a4ad55ccf53", "dest": "/var/log/leapp/answerfile", "gid": 0, "group": "root", "md5sum": "01e375235c8e4cafdec593b260354063", "mode": "0644", "owner": "root", "secontext": "unconfined_u:object_r:var_log_t:s0", "size": 48, "src": "/root/.ansible/tmp/ansible-tmp-1768226258.235742-7915-126693842694004/source", "state": "file", "uid": 0} TASK [analysis-leapp | Create /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:60 TASK [infra.leapp.common : custom_local_repos | Remove old /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:2 ok: [managed-node01] => {"changed": false, "path": "/etc/leapp/files/leapp_upgrade_repositories.repo", "state": "absent"} TASK [infra.leapp.common : custom_local_repos | Enable custom upgrade yum repositories] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:9 changed: [managed-node01] => (item={'name': 'rhel-10-for-x86_64-baseos-rpms', 'description': 'BaseOS for x86_64', 'baseurl': '__RHEL_10_0_BASEOS_REPO_URL__', 'state': 'present'}) => {"ansible_loop_var": "item", "changed": true, "item": {"baseurl": "__RHEL_10_0_BASEOS_REPO_URL__", "description": "BaseOS for x86_64", "name": "rhel-10-for-x86_64-baseos-rpms", "state": "present"}, "repo": "rhel-10-for-x86_64-baseos-rpms", "state": "present"} changed: [managed-node01] => (item={'name': 'rhel-10-for-x86_64-appstream-rpms', 'description': 'AppStream for x86_64', 'baseurl': '__RHEL_10_0_APPSTREAM_REPO_URL__', 'state': 'present'}) => {"ansible_loop_var": "item", "changed": true, "item": {"baseurl": "__RHEL_10_0_APPSTREAM_REPO_URL__", "description": "AppStream for x86_64", "name": "rhel-10-for-x86_64-appstream-rpms", "state": "present"}, "repo": "rhel-10-for-x86_64-appstream-rpms", "state": "present"} TASK [infra.leapp.analysis : analysis-leapp | Leapp preupgrade report] ********* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:71 ASYNC FAILED on managed-node01: jid=j292267462237.21424 changed: [managed-node01] => {"ansible_job_id": "j292267462237.21424", "changed": true, "cmd": "set -o pipefail; export PATH=$PATH; ulimit -n 16384; leapp preupgrade --report-schema=1.2.0 --no-rhsm 2>&1 | tee -a /var/log/ripu/ripu.log\n", "delta": "0:00:25.901960", "end": "2026-01-12 08:58:06.751318", "failed_when_result": false, "finished": 1, "msg": "non-zero return code", "rc": 1, "results_file": "/root/.ansible_async/j292267462237.21424", "start": "2026-01-12 08:57:40.849358", "started": 1, "stderr": "", "stderr_lines": [], "stdout": "\n============================================================\n UNSUPPORTED UPGRADE \n============================================================\n\nVariable LEAPP_UNSUPPORTED has been detected. Proceeding at your own risk.\nDevelopment variables have been detected:\n- LEAPP_DEVEL_RPMS_ALL_SIGNED=1\n\n============================================================\n UNSUPPORTED UPGRADE \n============================================================\n\n==> Processing phase `configuration_phase`\n====> * ipu_workflow_config\n IPU workflow config actor\n==> Processing phase `FactsCollection`\n====> * open_ssl_config_scanner\n Read an OpenSSL configuration file for further analysis.\n====> * scan_pam_user_db\n Scan the PAM service folder for the location of pam_userdb databases\n====> * storage_scanner\n Provides data about storage settings.\n====> * sssd_facts\n Check SSSD configuration for changes in RHEL10 and report them in model.\n====> * scan_source_boot_entry\n Scan the default boot entry of the source system.\n====> * transaction_workarounds\n Provides additional RPM transaction tasks based on bundled RPM packages.\n====> * repository_mapping\n Produces message containing repository mapping based on provided file.\n====> * ifcfg_scanner\n Scan ifcfg files with legacy network configuration\n====> * root_scanner\n Scan the system root directory and produce a message containing\n====> * scanclienablerepo\n Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.\n====> * system_facts\n Provides data about many facts from system.\n====> * get_enabled_modules\n Provides data about which module streams are enabled on the source system.\n====> * satellite_upgrade_services\n Reconfigure Satellite services\n====> * scan_target_os_image\n Scans the provided target OS ISO image to use as a content source for the IPU, if any.\n====> * luks_scanner\n Provides data about active LUKS devices.\n====> * xfs_info_scanner\n This actor scans all mounted mountpoints for XFS information.\n====> * rpm_scanner\n Provides data about installed RPM Packages.\n====> * scan_systemd_source\n Provides info about systemd on the source system\n====> * scan_default_initramfs\n Scan details of the default boot entry's initramfs image.\n====> * scancryptopolicies\n Scan information about system wide set crypto policies including:\n====> * copy_dnf_conf_into_target_userspace\n Copy dnf.conf into target userspace\n====> * scan_grub_device_name\n Find the name of the block devices where GRUB is located\n====> * scan_custom_modifications_actor\n Collects information about files in leapp directories that have been modified or newly added.\n====> * scan_hybrid_image_azure\n Check if the system is using Azure hybrid image.\n====> * scan_custom_repofile\n Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.\n====> * network_manager_read_config\n Provides data about NetworkManager configuration.\n====> * scandasd\n In case of s390x architecture, check whether DASD is used.\n====> * load_device_driver_deprecation_data\n Loads deprecation data for drivers and devices (PCI & CPU)\n====> * scan_files_for_target_userspace\n Scan the source system and identify files that will be copied into the target userspace when it is created.\n====> * scanmemory\n Scan Memory of the machine.\n====> * pci_devices_scanner\n Provides data about existing PCI Devices.\n====> * scan_grub_config\n Scan grub configuration files for errors.\n====> * scan_sap_hana\n Gathers information related to SAP HANA instances on the system.\n====> * scan_kernel_cmdline\n Scan the kernel command line of the booted system.\n====> * scan_source_files\n Scan files (explicitly specified) of the source system.\n====> * read_openssh_config\n Collect information about the OpenSSH configuration.\n====> * scan_pkg_manager\n Provides data about package manager (yum/dnf)\n====> * migrate_rpm_db\n Register a workaround to migrate RPM DB during the upgrade.\n====> * scanzfcp\n In case of s390x architecture, check whether ZFCP is used.\n====> * udevadm_info\n Produces data exported by the \"udevadm info\" command.\n====> * register_ruby_irb_adjustment\n Register a workaround to allow rubygem-irb's symlink -> directory conversion.\n====> * scan_subscription_manager_info\n Scans the current system for subscription manager information\n====> * persistentnetnames\n Get network interface information for physical ethernet interfaces of the original system.\n====> * remove_obsolete_gpg_keys\n Remove obsoleted RPM GPG keys.\n====> * selinuxcontentscanner\n Scan the system for any SELinux customizations\n====> * distribution_signed_rpm_scanner\n Provide data about distribution signed & third-party RPM packages.\n====> * trusted_gpg_keys_scanner\n Scan for trusted GPG keys.\n====> * ipa_scanner\n Scan system for ipa-client and ipa-server status\n====> * detect_kernel_drivers\n Matches all currently loaded kernel drivers against known deprecated and removed drivers.\n====> * checkrhui\n Check if system is using RHUI infrastructure (on public cloud) and send messages to\n====> * get_installed_desktops\n Actor checks if kde or gnome desktop environments\n====> * biosdevname\n Enable biosdevname on the target RHEL system if all interfaces on the source RHEL\n====> * repositories_blacklist\n Exclude target repositories provided by Red Hat without support.\n====> * scancpu\n Scan CPUs of the machine.\n====> * scan_dynamic_linker_configuration\n Scan the dynamic linker configuration and find modifications.\n====> * scan_fips\n Determine whether the source system has FIPS enabled.\n====> * persistentnetnamesdisable\n Disable systemd-udevd persistent network naming on machine with single eth0 NIC\n====> * rpm_transaction_config_tasks_collector\n Provides additional RPM transaction tasks from /etc/leapp/transaction.\n====> * pes_events_scanner\n Provides data about package events from Package Evolution Service.\n====> * scan_source_kernel\n Scan the source system kernel.\n====> * used_repository_scanner\n Scan used enabled repositories\n====> * scan_mysql\n Actor checking for presence of MySQL installation.\n====> * setuptargetrepos\n Produces list of repositories that should be available to be used during IPU process.\n==> Processing phase `Checks`\n====> * postgresql_check\n Actor checking for presence of PostgreSQL installation.\n====> * efi_check_boot\n Adjust EFI boot entry for first reboot\n====> * check_root_symlinks\n Check if the symlinks /bin and /lib are relative, not absolute.\n====> * check_grubenv_to_file\n Check whether grubenv is a symlink on Azure hybrid images using BIOS.\n====> * detect_grub_config_error\n Check grub configuration for various errors.\n====> * check_persistent_mounts\n Check if mounts required to be persistent are mounted in persistent fashion.\n====> * check_se_linux\n Check SELinux status and produce decision messages for further action.\n====> * check_skipped_repositories\n Produces a report if any repositories enabled on the system are going to be skipped.\n====> * check_systemd_broken_symlinks\n Check whether some systemd symlinks are broken\n====> * check_sap_hana\n If SAP HANA has been detected, several checks are performed to ensure a successful upgrade.\n====> * distribution_signed_rpm_check\n Check if there are any packages that are not signed by distribution GPG keys.\n====> * check_target_iso\n Check that the provided target ISO is a valid ISO image and is located on a persistent partition.\n====> * check_grub_core\n Check whether we are on legacy (BIOS) system and instruct Leapp to upgrade GRUB core\n====> * check_target_version\n Check that the target system version is supported by the upgrade process.\n====> * check_ipa_server\n Check for ipa-server and inhibit upgrade\n====> * check_system_arch\n Check if system is running at a supported architecture. If no, inhibit the upgrade process.\n====> * check_yum_plugins_enabled\n Checks that the required yum plugins are enabled.\n====> * bacula_check\n Actor checking for presence of Bacula installation.\n====> * checktargetrepos\n Check whether target yum repositories are specified.\n====> * sssd_check\n Check SSSD configuration for changes in RHEL10 and report them in model.\n====> * unsupported_upgrade_check\n Checks environment variables and produces a warning report if the upgrade is unsupported.\n====> * cephvolumescan\n Retrieves the list of encrypted Ceph OSD\n====> * check_boot_avail_space\n Check if at least 100Mib of available space on /boot. If not, inhibit the upgrade process.\n====> * check_default_initramfs\n Checks whether the default initramfs uses problematic dracut modules.\n====> * check_cifs\n Check if CIFS filesystem is in use. If yes, inhibit the upgrade process.\n====> * check_consumed_assets\n Check whether Leapp is using correct data assets.\n====> * check_custom_modifications_actor\n Checks CustomModifications messages and produces a report about files in leapp directories that have been\n====> * check_installed_kernels\n Inhibit IPU (in-place upgrade) when installed kernels conflict with a safe upgrade.\n====> * check_detected_devices_and_drivers\n Checks whether or not detected devices and drivers are usable on the target system.\n====> * check_pam_user_db\n Create report with the location of pam_userdb databases\n====> * check_dynamic_linker_configuration\n Check for customization of dynamic linker configuration.\n====> * mysql_check\n Actor checking for output produced by scanmysql actor.\n====> * check_etc_releasever\n Check releasever info and provide a guidance based on the facts\n====> * check_old_xfs\n Check mounted XFS file systems.\n====> * check_fips\n Inhibit upgrade if FIPS is detected as enabled.\n====> * network_deprecations\n Ensures that network configuration doesn't rely on unsupported settings\n====> * check_fstab_mount_order\n Checks order of entries in /etc/fstab based on their mount point and inhibits upgrade if overshadowing is detected.\n====> * crypto_policies_check\n This actor consumes previously gathered information about crypto policies on the source\n====> * inhibit_cgroupsv1\n Inhibit upgrade if cgroups-v1 are enabled\n====> * check_insights_auto_register\n Checks if system can be automatically registered into Red Hat Insights\n====> * libdb_check\n Actor checking for presence of libdb(Berkeley DB) installation.\n====> * check_rhsmsku\n Ensure the system is subscribed to the subscription manager\n====> * openssh_permit_root_login\n OpenSSH no longer allows root logins with password.\n====> * mariadb_check\n Actor checking for presence of MariaDB installation.\n====> * check_luks\n Check if any encrypted partitions are in use and whether they are supported for the upgrade.\n====> * open_ssl_engines_check\n The OpenSSL in RHEL 10 has deprecated engines in favor of providers.\n====> * checkmemory\n The actor check the size of RAM against RHEL8 minimal hardware requirements\n====> * check_rhsmsca\n Ensure that a registered system is in SCA (Simple Content Access)\n====> * check_microarchitecture\n Inhibit if RHEL9 microarchitecture requirements are not satisfied\n====> * check_mount_options\n Check for mount options preventing the upgrade.\n====> * check_nfs\n Check if NFS filesystem is in use. If yes, inhibit the upgrade process.\n====> * check_openssl_conf\n Check whether the openssl configuration and openssl-IBMCA.\n====> * check_os_release\n Check if the current RHEL minor version is supported. If not, inhibit the upgrade process.\n====> * check_rpm_transaction_events\n Filter RPM transaction events based on installed RPM packages\n====> * check_skip_phase\n Skip all the subsequent phases until the report phase.\n==> Processing phase `Reports`\n====> * verify_check_results\n Check all dialogs and notify that user needs to make some choices.\n====> * verify_check_results\n Check all generated results messages and notify user about them.\n\nDebug output written to /var/log/leapp/leapp-preupgrade.log\n\n============================================================\n REPORT OVERVIEW \n============================================================\n\nUpgrade has been inhibited due to the following problems:\n 1. Use of CIFS detected. Upgrade can't proceed\n 2. Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\n 3. Legacy network configuration found\n 4. Use of NFS detected. Upgrade can't proceed\n\nHIGH and MEDIUM severity reports:\n 1. GRUB2 core will be automatically updated during the upgrade\n 2. Upgrade is unsupported\n 3. Leapp detected a processor which is no longer maintained in RHEL 10.\n 4. Berkeley DB (libdb) has been detected on your system\n\nReports summary:\n Errors: 0\n Inhibitors: 4\n HIGH severity reports: 3\n MEDIUM severity reports: 1\n LOW severity reports: 1\n INFO severity reports: 2\n\nBefore continuing, review the full report below for details about discovered problems and possible remediation instructions:\n A report has been generated at /var/log/leapp/leapp-report.txt\n A report has been generated at /var/log/leapp/leapp-report.json\n\n============================================================\n END OF REPORT OVERVIEW \n============================================================\n\nAnswerfile has been generated at /var/log/leapp/answerfile", "stdout_lines": ["", "============================================================", " UNSUPPORTED UPGRADE ", "============================================================", "", "Variable LEAPP_UNSUPPORTED has been detected. Proceeding at your own risk.", "Development variables have been detected:", "- LEAPP_DEVEL_RPMS_ALL_SIGNED=1", "", "============================================================", " UNSUPPORTED UPGRADE ", "============================================================", "", "==> Processing phase `configuration_phase`", "====> * ipu_workflow_config", " IPU workflow config actor", "==> Processing phase `FactsCollection`", "====> * open_ssl_config_scanner", " Read an OpenSSL configuration file for further analysis.", "====> * scan_pam_user_db", " Scan the PAM service folder for the location of pam_userdb databases", "====> * storage_scanner", " Provides data about storage settings.", "====> * sssd_facts", " Check SSSD configuration for changes in RHEL10 and report them in model.", "====> * scan_source_boot_entry", " Scan the default boot entry of the source system.", "====> * transaction_workarounds", " Provides additional RPM transaction tasks based on bundled RPM packages.", "====> * repository_mapping", " Produces message containing repository mapping based on provided file.", "====> * ifcfg_scanner", " Scan ifcfg files with legacy network configuration", "====> * root_scanner", " Scan the system root directory and produce a message containing", "====> * scanclienablerepo", " Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.", "====> * system_facts", " Provides data about many facts from system.", "====> * get_enabled_modules", " Provides data about which module streams are enabled on the source system.", "====> * satellite_upgrade_services", " Reconfigure Satellite services", "====> * scan_target_os_image", " Scans the provided target OS ISO image to use as a content source for the IPU, if any.", "====> * luks_scanner", " Provides data about active LUKS devices.", "====> * xfs_info_scanner", " This actor scans all mounted mountpoints for XFS information.", "====> * rpm_scanner", " Provides data about installed RPM Packages.", "====> * scan_systemd_source", " Provides info about systemd on the source system", "====> * scan_default_initramfs", " Scan details of the default boot entry's initramfs image.", "====> * scancryptopolicies", " Scan information about system wide set crypto policies including:", "====> * copy_dnf_conf_into_target_userspace", " Copy dnf.conf into target userspace", "====> * scan_grub_device_name", " Find the name of the block devices where GRUB is located", "====> * scan_custom_modifications_actor", " Collects information about files in leapp directories that have been modified or newly added.", "====> * scan_hybrid_image_azure", " Check if the system is using Azure hybrid image.", "====> * scan_custom_repofile", " Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.", "====> * network_manager_read_config", " Provides data about NetworkManager configuration.", "====> * scandasd", " In case of s390x architecture, check whether DASD is used.", "====> * load_device_driver_deprecation_data", " Loads deprecation data for drivers and devices (PCI & CPU)", "====> * scan_files_for_target_userspace", " Scan the source system and identify files that will be copied into the target userspace when it is created.", "====> * scanmemory", " Scan Memory of the machine.", "====> * pci_devices_scanner", " Provides data about existing PCI Devices.", "====> * scan_grub_config", " Scan grub configuration files for errors.", "====> * scan_sap_hana", " Gathers information related to SAP HANA instances on the system.", "====> * scan_kernel_cmdline", " Scan the kernel command line of the booted system.", "====> * scan_source_files", " Scan files (explicitly specified) of the source system.", "====> * read_openssh_config", " Collect information about the OpenSSH configuration.", "====> * scan_pkg_manager", " Provides data about package manager (yum/dnf)", "====> * migrate_rpm_db", " Register a workaround to migrate RPM DB during the upgrade.", "====> * scanzfcp", " In case of s390x architecture, check whether ZFCP is used.", "====> * udevadm_info", " Produces data exported by the \"udevadm info\" command.", "====> * register_ruby_irb_adjustment", " Register a workaround to allow rubygem-irb's symlink -> directory conversion.", "====> * scan_subscription_manager_info", " Scans the current system for subscription manager information", "====> * persistentnetnames", " Get network interface information for physical ethernet interfaces of the original system.", "====> * remove_obsolete_gpg_keys", " Remove obsoleted RPM GPG keys.", "====> * selinuxcontentscanner", " Scan the system for any SELinux customizations", "====> * distribution_signed_rpm_scanner", " Provide data about distribution signed & third-party RPM packages.", "====> * trusted_gpg_keys_scanner", " Scan for trusted GPG keys.", "====> * ipa_scanner", " Scan system for ipa-client and ipa-server status", "====> * detect_kernel_drivers", " Matches all currently loaded kernel drivers against known deprecated and removed drivers.", "====> * checkrhui", " Check if system is using RHUI infrastructure (on public cloud) and send messages to", "====> * get_installed_desktops", " Actor checks if kde or gnome desktop environments", "====> * biosdevname", " Enable biosdevname on the target RHEL system if all interfaces on the source RHEL", "====> * repositories_blacklist", " Exclude target repositories provided by Red Hat without support.", "====> * scancpu", " Scan CPUs of the machine.", "====> * scan_dynamic_linker_configuration", " Scan the dynamic linker configuration and find modifications.", "====> * scan_fips", " Determine whether the source system has FIPS enabled.", "====> * persistentnetnamesdisable", " Disable systemd-udevd persistent network naming on machine with single eth0 NIC", "====> * rpm_transaction_config_tasks_collector", " Provides additional RPM transaction tasks from /etc/leapp/transaction.", "====> * pes_events_scanner", " Provides data about package events from Package Evolution Service.", "====> * scan_source_kernel", " Scan the source system kernel.", "====> * used_repository_scanner", " Scan used enabled repositories", "====> * scan_mysql", " Actor checking for presence of MySQL installation.", "====> * setuptargetrepos", " Produces list of repositories that should be available to be used during IPU process.", "==> Processing phase `Checks`", "====> * postgresql_check", " Actor checking for presence of PostgreSQL installation.", "====> * efi_check_boot", " Adjust EFI boot entry for first reboot", "====> * check_root_symlinks", " Check if the symlinks /bin and /lib are relative, not absolute.", "====> * check_grubenv_to_file", " Check whether grubenv is a symlink on Azure hybrid images using BIOS.", "====> * detect_grub_config_error", " Check grub configuration for various errors.", "====> * check_persistent_mounts", " Check if mounts required to be persistent are mounted in persistent fashion.", "====> * check_se_linux", " Check SELinux status and produce decision messages for further action.", "====> * check_skipped_repositories", " Produces a report if any repositories enabled on the system are going to be skipped.", "====> * check_systemd_broken_symlinks", " Check whether some systemd symlinks are broken", "====> * check_sap_hana", " If SAP HANA has been detected, several checks are performed to ensure a successful upgrade.", "====> * distribution_signed_rpm_check", " Check if there are any packages that are not signed by distribution GPG keys.", "====> * check_target_iso", " Check that the provided target ISO is a valid ISO image and is located on a persistent partition.", "====> * check_grub_core", " Check whether we are on legacy (BIOS) system and instruct Leapp to upgrade GRUB core", "====> * check_target_version", " Check that the target system version is supported by the upgrade process.", "====> * check_ipa_server", " Check for ipa-server and inhibit upgrade", "====> * check_system_arch", " Check if system is running at a supported architecture. If no, inhibit the upgrade process.", "====> * check_yum_plugins_enabled", " Checks that the required yum plugins are enabled.", "====> * bacula_check", " Actor checking for presence of Bacula installation.", "====> * checktargetrepos", " Check whether target yum repositories are specified.", "====> * sssd_check", " Check SSSD configuration for changes in RHEL10 and report them in model.", "====> * unsupported_upgrade_check", " Checks environment variables and produces a warning report if the upgrade is unsupported.", "====> * cephvolumescan", " Retrieves the list of encrypted Ceph OSD", "====> * check_boot_avail_space", " Check if at least 100Mib of available space on /boot. If not, inhibit the upgrade process.", "====> * check_default_initramfs", " Checks whether the default initramfs uses problematic dracut modules.", "====> * check_cifs", " Check if CIFS filesystem is in use. If yes, inhibit the upgrade process.", "====> * check_consumed_assets", " Check whether Leapp is using correct data assets.", "====> * check_custom_modifications_actor", " Checks CustomModifications messages and produces a report about files in leapp directories that have been", "====> * check_installed_kernels", " Inhibit IPU (in-place upgrade) when installed kernels conflict with a safe upgrade.", "====> * check_detected_devices_and_drivers", " Checks whether or not detected devices and drivers are usable on the target system.", "====> * check_pam_user_db", " Create report with the location of pam_userdb databases", "====> * check_dynamic_linker_configuration", " Check for customization of dynamic linker configuration.", "====> * mysql_check", " Actor checking for output produced by scanmysql actor.", "====> * check_etc_releasever", " Check releasever info and provide a guidance based on the facts", "====> * check_old_xfs", " Check mounted XFS file systems.", "====> * check_fips", " Inhibit upgrade if FIPS is detected as enabled.", "====> * network_deprecations", " Ensures that network configuration doesn't rely on unsupported settings", "====> * check_fstab_mount_order", " Checks order of entries in /etc/fstab based on their mount point and inhibits upgrade if overshadowing is detected.", "====> * crypto_policies_check", " This actor consumes previously gathered information about crypto policies on the source", "====> * inhibit_cgroupsv1", " Inhibit upgrade if cgroups-v1 are enabled", "====> * check_insights_auto_register", " Checks if system can be automatically registered into Red Hat Insights", "====> * libdb_check", " Actor checking for presence of libdb(Berkeley DB) installation.", "====> * check_rhsmsku", " Ensure the system is subscribed to the subscription manager", "====> * openssh_permit_root_login", " OpenSSH no longer allows root logins with password.", "====> * mariadb_check", " Actor checking for presence of MariaDB installation.", "====> * check_luks", " Check if any encrypted partitions are in use and whether they are supported for the upgrade.", "====> * open_ssl_engines_check", " The OpenSSL in RHEL 10 has deprecated engines in favor of providers.", "====> * checkmemory", " The actor check the size of RAM against RHEL8 minimal hardware requirements", "====> * check_rhsmsca", " Ensure that a registered system is in SCA (Simple Content Access)", "====> * check_microarchitecture", " Inhibit if RHEL9 microarchitecture requirements are not satisfied", "====> * check_mount_options", " Check for mount options preventing the upgrade.", "====> * check_nfs", " Check if NFS filesystem is in use. If yes, inhibit the upgrade process.", "====> * check_openssl_conf", " Check whether the openssl configuration and openssl-IBMCA.", "====> * check_os_release", " Check if the current RHEL minor version is supported. If not, inhibit the upgrade process.", "====> * check_rpm_transaction_events", " Filter RPM transaction events based on installed RPM packages", "====> * check_skip_phase", " Skip all the subsequent phases until the report phase.", "==> Processing phase `Reports`", "====> * verify_check_results", " Check all dialogs and notify that user needs to make some choices.", "====> * verify_check_results", " Check all generated results messages and notify user about them.", "", "Debug output written to /var/log/leapp/leapp-preupgrade.log", "", "============================================================", " REPORT OVERVIEW ", "============================================================", "", "Upgrade has been inhibited due to the following problems:", " 1. Use of CIFS detected. Upgrade can't proceed", " 2. Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.", " 3. Legacy network configuration found", " 4. Use of NFS detected. Upgrade can't proceed", "", "HIGH and MEDIUM severity reports:", " 1. GRUB2 core will be automatically updated during the upgrade", " 2. Upgrade is unsupported", " 3. Leapp detected a processor which is no longer maintained in RHEL 10.", " 4. Berkeley DB (libdb) has been detected on your system", "", "Reports summary:", " Errors: 0", " Inhibitors: 4", " HIGH severity reports: 3", " MEDIUM severity reports: 1", " LOW severity reports: 1", " INFO severity reports: 2", "", "Before continuing, review the full report below for details about discovered problems and possible remediation instructions:", " A report has been generated at /var/log/leapp/leapp-report.txt", " A report has been generated at /var/log/leapp/leapp-report.json", "", "============================================================", " END OF REPORT OVERVIEW ", "============================================================", "", "Answerfile has been generated at /var/log/leapp/answerfile"]} TASK [analysis-leapp | Include custom_local_repos for local_repos_post_analysis] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:89 TASK [infra.leapp.common : custom_local_repos | Remove old /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:2 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : custom_local_repos | Enable custom upgrade yum repositories] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:9 skipping: [managed-node01] => {"changed": false, "skipped_reason": "No items in the list"} TASK [infra.leapp.analysis : analysis-leapp | Include check-results-file.yml] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:97 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/check-results-file.yml for managed-node01 TASK [infra.leapp.analysis : check-results-file | Result file status] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/check-results-file.yml:2 ok: [managed-node01] => {"changed": false, "stat": {"atime": 1768226286.5967839, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 16, "charset": "us-ascii", "checksum": "6527a8872d44676810567c5f39306147dce02efb", "ctime": 1768226286.5967839, "dev": 51716, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 687866006, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1768226286.5967839, "nlink": 1, "path": "/var/log/leapp/leapp-report.txt", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 7422, "uid": 0, "version": "2006541914", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} TASK [infra.leapp.analysis : check-results-file | Check that result file exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/check-results-file.yml:7 ok: [managed-node01] => { "changed": false, "msg": "All assertions passed" } TASK [analysis-leapp | Run parse_leapp_report to check for inhibitors] ********* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:100 TASK [infra.leapp.common : parse_leapp_report | Default upgrade_inhibited to false] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:12 ok: [managed-node01] => {"ansible_facts": {"upgrade_inhibited": false}, "changed": false} TASK [infra.leapp.common : parse_leapp_report | Collect human readable report results] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:16 ok: [managed-node01] => {"changed": false, "content": "Risk Factor: high (inhibitor)
Title: Use of CIFS detected. Upgrade can't proceed
Summary: CIFS is currently not supported by the inplace upgrade.
Related links:
    - Leapp upgrade failed with error "Inhibitor: Use of CIFS detected. Upgrade cannot proceed": https://access.redhat.com/solutions/6964304
Remediation: [hint] Comment out CIFS entries to proceed with the upgrade.
Key: d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a
----------------------------------------
Risk Factor: high (inhibitor)
Title: Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.
Summary: Support for the following RHEL 9 device drivers has been removed in RHEL 10:
     - qla3xxx
     - vmw_pvrdma

Related links:
    - Leapp preupgrade getting "Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.": https://access.redhat.com/solutions/6971716
    - Leapp upgrade fail with error "Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.": https://access.redhat.com/solutions/5436131
Key: 48e04852631245aa4afee9adcdc7c2375b8cffb8
----------------------------------------
Risk Factor: high (inhibitor)
Title: Legacy network configuration found
Summary: Network configuration files in legacy "ifcfg" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:
    - /etc/sysconfig/network-scripts/ifcfg-eth0
Related links:
    - How to migrate the connection from ifcfg to NetworkManager keyfile plugin?: https://access.redhat.com/solutions/7083803
    - nmcli(1) manual, describes "connection migrate" sub-command.: https://networkmanager.dev/docs/api/latest/nmcli.html
    - nm-settings-ifcfg-rh(5), description of the "ifcfg" format: https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html
    - nm-settings-keyfile(5), description of the "keyfile" format: https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html
Remediation: [hint] Convert the configuration into NetworkManager native "keyfile" format.
[command] nmcli connection migrate /etc/sysconfig/network-scripts/ifcfg-eth0
Key: 7de70b43c3c9d20075e30894ac24a4c4e2d70837
----------------------------------------
Risk Factor: high (inhibitor)
Title: Use of NFS detected. Upgrade can't proceed
Summary: NFS is currently not supported by the inplace upgrade.
We have found NFS usage at the following locations:
- NFS shares found in /etc/fstab:
 - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat
 - nest.test.redhat.com:/mnt/qa /mnt/qa
 - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive
 - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist
 - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew
 - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch

Related links:
    - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006
Remediation: [hint] Disable NFS temporarily for the upgrade if possible.
Key: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed
----------------------------------------
Risk Factor: high 
Title: GRUB2 core will be automatically updated during the upgrade
Summary: On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running "grub2-install" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.
Key: ac7030e05d2ee248d34f08a9fa040b352bc410a3
----------------------------------------
Risk Factor: high 
Title: Upgrade is unsupported
Summary: Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.

Key: 9e5088e3c1f371e020ec777c3d86578f4be143cf
----------------------------------------
Risk Factor: high 
Title: Leapp detected a processor which is no longer maintained in RHEL 10.
Summary: The following processors are no longer maintained in RHEL 10:
     - HASWELL_X

Key: 9dde4bcd8b458bd6803462216785df3a1476c1f8
----------------------------------------
Risk Factor: medium 
Title: Berkeley DB (libdb) has been detected on your system
Summary: Libdb was marked as deprecated in RHEL-9 and in RHEL-10 is not included anymore. There are a couple of alternatives in RHEL-10; the applications that depend on libdb will not work. Such applications must implement another type of backend storage. And migrate existing data to the new database format.
Related links:
    - Migrating to a RHEL 10 without libdb: https://access.redhat.com/articles/7099256
Remediation: [hint] Back up your data before proceeding with the data upgrade/migration. For the conversion, the tool db_converter from the libdb-utils rpm could be used. This database format conversion must be performed before the system upgrade. The db_converter is not available in RHEL 10 systems. For more information, see the provided article.
Key: fdc8f5b084e95922a4f59485a807a92cae2fc738
----------------------------------------
Risk Factor: low 
Title: SElinux will be set to permissive mode
Summary: SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.
Remediation: [hint] Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the "/root/tmp_leapp_py3" SElinux warnings.
Key: 39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f
----------------------------------------
Risk Factor: info 
Title: Excluded target system repositories
Summary: The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.
- codeready-builder-for-rhel-10-s390x-rpms
- rhui-codeready-builder-for-rhel-10-x86_64-rhui-rpms
- codeready-builder-for-rhel-10-ppc64le-rpms
- codeready-builder-beta-for-rhel-10-s390x-rpms
- codeready-builder-for-rhel-10-x86_64-rpms
- codeready-builder-for-rhel-10-ppc64le-eus-rpms
- codeready-builder-for-rhel-10-aarch64-rpms
- rhui-codeready-builder-for-rhel-10-aarch64-rhui-rpms
- crb
- codeready-builder-for-rhel-10-s390x-eus-rpms
- codeready-builder-for-rhel-10-x86_64-eus-rpms
- codeready-builder-beta-for-rhel-10-aarch64-rpms
- codeready-builder-for-rhel-10-rhui-rpms
- codeready-builder-beta-for-rhel-10-x86_64-rpms
- codeready-builder-for-rhel-10-aarch64-eus-rpms
- codeready-builder-beta-for-rhel-10-ppc64le-rpms
Remediation: [hint] If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).
Key: 1b9132cb2362ae7830e48eee7811be9527747de8
----------------------------------------
Risk Factor: info 
Title: SElinux relabeling will be scheduled
Summary: SElinux relabeling will be scheduled as the status is permissive/enforcing.
Key: 8fb81863f8413bd617c2a55b69b8e10ff03d7c72
----------------------------------------
", "encoding": "base64", "source": "/var/log/leapp/leapp-report.txt"} TASK [infra.leapp.common : parse_leapp_report | Collect JSON report results] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:21 ok: [managed-node01] => {"changed": false, "content": "{
  "entries": [
    {
      "audience": "sysadmin",
      "detail": {
        "remediations": [
          {
            "context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).",
            "type": "hint"
          }
        ]
      },
      "groups": [
        "repository",
        "failure"
      ],
      "key": "1b9132cb2362ae7830e48eee7811be9527747de8",
      "severity": "info",
      "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-for-rhel-10-s390x-rpms\n- rhui-codeready-builder-for-rhel-10-x86_64-rhui-rpms\n- codeready-builder-for-rhel-10-ppc64le-rpms\n- codeready-builder-beta-for-rhel-10-s390x-rpms\n- codeready-builder-for-rhel-10-x86_64-rpms\n- codeready-builder-for-rhel-10-ppc64le-eus-rpms\n- codeready-builder-for-rhel-10-aarch64-rpms\n- rhui-codeready-builder-for-rhel-10-aarch64-rhui-rpms\n- crb\n- codeready-builder-for-rhel-10-s390x-eus-rpms\n- codeready-builder-for-rhel-10-x86_64-eus-rpms\n- codeready-builder-beta-for-rhel-10-aarch64-rpms\n- codeready-builder-for-rhel-10-rhui-rpms\n- codeready-builder-beta-for-rhel-10-x86_64-rpms\n- codeready-builder-for-rhel-10-aarch64-eus-rpms\n- codeready-builder-beta-for-rhel-10-ppc64le-rpms",
      "title": "Excluded target system repositories",
      "timeStamp": "2026-01-12T13:58:02.104249Z",
      "hostname": "managed-node01",
      "actor": "repositories_blacklist",
      "id": "ec3586a9593df495fe5ed948919727fba1ca1707034d3daaff201c94ac9b7524"
    },
    {
      "audience": "sysadmin",
      "groups": [
        "selinux",
        "security"
      ],
      "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72",
      "severity": "info",
      "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.",
      "title": "SElinux relabeling will be scheduled",
      "timeStamp": "2026-01-12T13:58:04.158101Z",
      "hostname": "managed-node01",
      "actor": "check_se_linux",
      "id": "47949c93f5c86d361e1e10aaacb80c7741a43236819a51e45781dcd1043a3236"
    },
    {
      "audience": "sysadmin",
      "detail": {
        "remediations": [
          {
            "context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.",
            "type": "hint"
          }
        ]
      },
      "groups": [
        "selinux",
        "security"
      ],
      "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f",
      "severity": "low",
      "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.",
      "title": "SElinux will be set to permissive mode",
      "timeStamp": "2026-01-12T13:58:04.162042Z",
      "hostname": "managed-node01",
      "actor": "check_se_linux",
      "id": "4cd9064b70ffafa8020e1442a64d9a04df136f4d545176eec0432466ce5c1e70"
    },
    {
      "audience": "sysadmin",
      "groups": [
        "boot"
      ],
      "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3",
      "severity": "high",
      "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.",
      "title": "GRUB2 core will be automatically updated during the upgrade",
      "timeStamp": "2026-01-12T13:58:04.398323Z",
      "hostname": "managed-node01",
      "actor": "check_grub_core",
      "id": "81fa8268605976dcca65bd169419db8fe87cb3148b53cb9d77bda2f10296f14b"
    },
    {
      "audience": "sysadmin",
      "groups": [
        "upgrade process",
        "sanity"
      ],
      "key": "9e5088e3c1f371e020ec777c3d86578f4be143cf",
      "severity": "high",
      "summary": "Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.\n",
      "title": "Upgrade is unsupported",
      "timeStamp": "2026-01-12T13:58:04.868626Z",
      "hostname": "managed-node01",
      "actor": "unsupported_upgrade_check",
      "id": "b657ccde7581ec3383f986ec6c3c32bc1d1086d22e7d4f39740bef33b01d3af3"
    },
    {
      "audience": "sysadmin",
      "detail": {
        "external": [
          {
            "title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"",
            "url": "https://access.redhat.com/solutions/6964304"
          }
        ],
        "related_resources": [
          {
            "scheme": "file",
            "title": "/etc/fstab"
          }
        ],
        "remediations": [
          {
            "context": "Comment out CIFS entries to proceed with the upgrade.",
            "type": "hint"
          }
        ]
      },
      "groups": [
        "filesystem",
        "network",
        "inhibitor"
      ],
      "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a",
      "severity": "high",
      "summary": "CIFS is currently not supported by the inplace upgrade.",
      "title": "Use of CIFS detected. Upgrade can't proceed",
      "timeStamp": "2026-01-12T13:58:05.022466Z",
      "hostname": "managed-node01",
      "actor": "check_cifs",
      "id": "7d1a4b2859cfa9a9e47e0986278a60695a41893cd51aab1ec41188d0316b902f"
    },
    {
      "audience": "sysadmin",
      "detail": {
        "external": [
          {
            "title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\"",
            "url": "https://access.redhat.com/solutions/6971716"
          },
          {
            "title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\"",
            "url": "https://access.redhat.com/solutions/5436131"
          }
        ]
      },
      "groups": [
        "kernel",
        "drivers",
        "inhibitor"
      ],
      "key": "48e04852631245aa4afee9adcdc7c2375b8cffb8",
      "severity": "high",
      "summary": "Support for the following RHEL 9 device drivers has been removed in RHEL 10:\n     - qla3xxx\n     - vmw_pvrdma\n",
      "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.",
      "timeStamp": "2026-01-12T13:58:05.219121Z",
      "hostname": "managed-node01",
      "actor": "check_detected_devices_and_drivers",
      "id": "209ca2ad519594527e5c95cd2a1c08c66833738d593d41ff0aa73d82ef3c72db"
    },
    {
      "audience": "sysadmin",
      "groups": [
        "kernel",
        "boot"
      ],
      "key": "9dde4bcd8b458bd6803462216785df3a1476c1f8",
      "severity": "high",
      "summary": "The following processors are no longer maintained in RHEL 10:\n     - HASWELL_X\n",
      "title": "Leapp detected a processor which is no longer maintained in RHEL 10.",
      "timeStamp": "2026-01-12T13:58:05.221945Z",
      "hostname": "managed-node01",
      "actor": "check_detected_devices_and_drivers",
      "id": "6eceee9a6ee749acad9a91912df006364dd9975d595a8ef834a9b74dba613529"
    },
    {
      "audience": "sysadmin",
      "detail": {
        "external": [
          {
            "title": "How to migrate the connection from ifcfg to NetworkManager keyfile plugin?",
            "url": "https://access.redhat.com/solutions/7083803"
          },
          {
            "title": "nmcli(1) manual, describes \"connection migrate\" sub-command.",
            "url": "https://networkmanager.dev/docs/api/latest/nmcli.html"
          },
          {
            "title": "nm-settings-ifcfg-rh(5), description of the \"ifcfg\" format",
            "url": "https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html"
          },
          {
            "title": "nm-settings-keyfile(5), description of the \"keyfile\" format",
            "url": "https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html"
          }
        ],
        "related_resources": [
          {
            "scheme": "package",
            "title": "NetworkManager"
          },
          {
            "scheme": "file",
            "title": "/etc/sysconfig/network-scripts/ifcfg-eth0"
          }
        ],
        "remediations": [
          {
            "context": "Convert the configuration into NetworkManager native \"keyfile\" format.",
            "type": "hint"
          },
          {
            "context": [
              "nmcli",
              "connection",
              "migrate",
              "/etc/sysconfig/network-scripts/ifcfg-eth0"
            ],
            "type": "command"
          }
        ]
      },
      "groups": [
        "network",
        "services",
        "inhibitor"
      ],
      "key": "7de70b43c3c9d20075e30894ac24a4c4e2d70837",
      "severity": "high",
      "summary": "Network configuration files in legacy \"ifcfg\" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:\n    - /etc/sysconfig/network-scripts/ifcfg-eth0",
      "title": "Legacy network configuration found",
      "timeStamp": "2026-01-12T13:58:05.501987Z",
      "hostname": "managed-node01",
      "actor": "network_deprecations",
      "id": "f475031f70e687cdddd38e4e97b94cbcc771b878102484e33af86b6a12ae64f0"
    },
    {
      "audience": "sysadmin",
      "detail": {
        "external": [
          {
            "title": "Migrating to a RHEL 10 without libdb",
            "url": "https://access.redhat.com/articles/7099256"
          }
        ],
        "related_resources": [
          {
            "scheme": "package",
            "title": "libdb"
          }
        ],
        "remediations": [
          {
            "context": "Back up your data before proceeding with the data upgrade/migration. For the conversion, the tool db_converter from the libdb-utils rpm could be used. This database format conversion must be performed before the system upgrade. The db_converter is not available in RHEL 10 systems. For more information, see the provided article.",
            "type": "hint"
          }
        ]
      },
      "groups": [
        "services"
      ],
      "key": "fdc8f5b084e95922a4f59485a807a92cae2fc738",
      "severity": "medium",
      "summary": "Libdb was marked as deprecated in RHEL-9 and in RHEL-10 is not included anymore. There are a couple of alternatives in RHEL-10; the applications that depend on libdb will not work. Such applications must implement another type of backend storage. And migrate existing data to the new database format.",
      "title": "Berkeley DB (libdb) has been detected on your system",
      "timeStamp": "2026-01-12T13:58:05.798708Z",
      "hostname": "managed-node01",
      "actor": "libdb_check",
      "id": "9c5e4acaa43d37141c8b127264783908c6bdccbe4290183cf0e8beb2ae6c7a34"
    },
    {
      "audience": "sysadmin",
      "detail": {
        "external": [
          {
            "title": "Why does leapp upgrade fail on detecting NFS during upgrade?",
            "url": "https://access.redhat.com/solutions/6964006"
          }
        ],
        "related_resources": [
          {
            "scheme": "file",
            "title": "/etc/fstab"
          }
        ],
        "remediations": [
          {
            "context": "Disable NFS temporarily for the upgrade if possible.",
            "type": "hint"
          }
        ]
      },
      "groups": [
        "filesystem",
        "network",
        "inhibitor"
      ],
      "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed",
      "severity": "high",
      "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n",
      "title": "Use of NFS detected. Upgrade can't proceed",
      "timeStamp": "2026-01-12T13:58:06.297471Z",
      "hostname": "managed-node01",
      "actor": "check_nfs",
      "id": "830bde6c37fe89aa3306731ef54dcc83b5ee7564cfeeb1af8e4e7d82f037b5a8"
    }
  ],
  "leapp_run_id": "9f3479cc-c0ed-4f3c-8156-f48d16895287"
}
", "encoding": "base64", "source": "/var/log/leapp/leapp-report.json"} TASK [infra.leapp.common : parse_leapp_report | Parse report results] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:26 ok: [managed-node01] => {"ansible_facts": {"leapp_report_json": {"entries": [{"actor": "repositories_blacklist", "audience": "sysadmin", "detail": {"remediations": [{"context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "type": "hint"}]}, "groups": ["repository", "failure"], "hostname": "managed-node01", "id": "ec3586a9593df495fe5ed948919727fba1ca1707034d3daaff201c94ac9b7524", "key": "1b9132cb2362ae7830e48eee7811be9527747de8", "severity": "info", "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-for-rhel-10-s390x-rpms\n- rhui-codeready-builder-for-rhel-10-x86_64-rhui-rpms\n- codeready-builder-for-rhel-10-ppc64le-rpms\n- codeready-builder-beta-for-rhel-10-s390x-rpms\n- codeready-builder-for-rhel-10-x86_64-rpms\n- codeready-builder-for-rhel-10-ppc64le-eus-rpms\n- codeready-builder-for-rhel-10-aarch64-rpms\n- rhui-codeready-builder-for-rhel-10-aarch64-rhui-rpms\n- crb\n- codeready-builder-for-rhel-10-s390x-eus-rpms\n- codeready-builder-for-rhel-10-x86_64-eus-rpms\n- codeready-builder-beta-for-rhel-10-aarch64-rpms\n- codeready-builder-for-rhel-10-rhui-rpms\n- codeready-builder-beta-for-rhel-10-x86_64-rpms\n- codeready-builder-for-rhel-10-aarch64-eus-rpms\n- codeready-builder-beta-for-rhel-10-ppc64le-rpms", "timeStamp": "2026-01-12T13:58:02.104249Z", "title": "Excluded target system repositories"}, {"actor": "check_se_linux", "audience": "sysadmin", "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "47949c93f5c86d361e1e10aaacb80c7741a43236819a51e45781dcd1043a3236", "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", "severity": "info", "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", "timeStamp": "2026-01-12T13:58:04.158101Z", "title": "SElinux relabeling will be scheduled"}, {"actor": "check_se_linux", "audience": "sysadmin", "detail": {"remediations": [{"context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.", "type": "hint"}]}, "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "4cd9064b70ffafa8020e1442a64d9a04df136f4d545176eec0432466ce5c1e70", "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", "severity": "low", "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", "timeStamp": "2026-01-12T13:58:04.162042Z", "title": "SElinux will be set to permissive mode"}, {"actor": "check_grub_core", "audience": "sysadmin", "groups": ["boot"], "hostname": "managed-node01", "id": "81fa8268605976dcca65bd169419db8fe87cb3148b53cb9d77bda2f10296f14b", "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", "severity": "high", "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", "timeStamp": "2026-01-12T13:58:04.398323Z", "title": "GRUB2 core will be automatically updated during the upgrade"}, {"actor": "unsupported_upgrade_check", "audience": "sysadmin", "groups": ["upgrade process", "sanity"], "hostname": "managed-node01", "id": "b657ccde7581ec3383f986ec6c3c32bc1d1086d22e7d4f39740bef33b01d3af3", "key": "9e5088e3c1f371e020ec777c3d86578f4be143cf", "severity": "high", "summary": "Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.\n", "timeStamp": "2026-01-12T13:58:04.868626Z", "title": "Upgrade is unsupported"}, {"actor": "check_cifs", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "7d1a4b2859cfa9a9e47e0986278a60695a41893cd51aab1ec41188d0316b902f", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2026-01-12T13:58:05.022466Z", "title": "Use of CIFS detected. Upgrade can't proceed"}, {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "209ca2ad519594527e5c95cd2a1c08c66833738d593d41ff0aa73d82ef3c72db", "key": "48e04852631245aa4afee9adcdc7c2375b8cffb8", "severity": "high", "summary": "Support for the following RHEL 9 device drivers has been removed in RHEL 10:\n - qla3xxx\n - vmw_pvrdma\n", "timeStamp": "2026-01-12T13:58:05.219121Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed."}, {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "groups": ["kernel", "boot"], "hostname": "managed-node01", "id": "6eceee9a6ee749acad9a91912df006364dd9975d595a8ef834a9b74dba613529", "key": "9dde4bcd8b458bd6803462216785df3a1476c1f8", "severity": "high", "summary": "The following processors are no longer maintained in RHEL 10:\n - HASWELL_X\n", "timeStamp": "2026-01-12T13:58:05.221945Z", "title": "Leapp detected a processor which is no longer maintained in RHEL 10."}, {"actor": "network_deprecations", "audience": "sysadmin", "detail": {"external": [{"title": "How to migrate the connection from ifcfg to NetworkManager keyfile plugin?", "url": "https://access.redhat.com/solutions/7083803"}, {"title": "nmcli(1) manual, describes \"connection migrate\" sub-command.", "url": "https://networkmanager.dev/docs/api/latest/nmcli.html"}, {"title": "nm-settings-ifcfg-rh(5), description of the \"ifcfg\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html"}, {"title": "nm-settings-keyfile(5), description of the \"keyfile\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html"}], "related_resources": [{"scheme": "package", "title": "NetworkManager"}, {"scheme": "file", "title": "/etc/sysconfig/network-scripts/ifcfg-eth0"}], "remediations": [{"context": "Convert the configuration into NetworkManager native \"keyfile\" format.", "type": "hint"}, {"context": ["nmcli", "connection", "migrate", "/etc/sysconfig/network-scripts/ifcfg-eth0"], "type": "command"}]}, "groups": ["network", "services", "inhibitor"], "hostname": "managed-node01", "id": "f475031f70e687cdddd38e4e97b94cbcc771b878102484e33af86b6a12ae64f0", "key": "7de70b43c3c9d20075e30894ac24a4c4e2d70837", "severity": "high", "summary": "Network configuration files in legacy \"ifcfg\" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:\n - /etc/sysconfig/network-scripts/ifcfg-eth0", "timeStamp": "2026-01-12T13:58:05.501987Z", "title": "Legacy network configuration found"}, {"actor": "libdb_check", "audience": "sysadmin", "detail": {"external": [{"title": "Migrating to a RHEL 10 without libdb", "url": "https://access.redhat.com/articles/7099256"}], "related_resources": [{"scheme": "package", "title": "libdb"}], "remediations": [{"context": "Back up your data before proceeding with the data upgrade/migration. For the conversion, the tool db_converter from the libdb-utils rpm could be used. This database format conversion must be performed before the system upgrade. The db_converter is not available in RHEL 10 systems. For more information, see the provided article.", "type": "hint"}]}, "groups": ["services"], "hostname": "managed-node01", "id": "9c5e4acaa43d37141c8b127264783908c6bdccbe4290183cf0e8beb2ae6c7a34", "key": "fdc8f5b084e95922a4f59485a807a92cae2fc738", "severity": "medium", "summary": "Libdb was marked as deprecated in RHEL-9 and in RHEL-10 is not included anymore. There are a couple of alternatives in RHEL-10; the applications that depend on libdb will not work. Such applications must implement another type of backend storage. And migrate existing data to the new database format.", "timeStamp": "2026-01-12T13:58:05.798708Z", "title": "Berkeley DB (libdb) has been detected on your system"}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "830bde6c37fe89aa3306731ef54dcc83b5ee7564cfeeb1af8e4e7d82f037b5a8", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n", "timeStamp": "2026-01-12T13:58:06.297471Z", "title": "Use of NFS detected. Upgrade can't proceed"}], "leapp_run_id": "9f3479cc-c0ed-4f3c-8156-f48d16895287"}, "leapp_report_txt": ["Risk Factor: high (inhibitor)", "Title: Use of CIFS detected. Upgrade can't proceed", "Summary: CIFS is currently not supported by the inplace upgrade.", "Related links:", " - Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\": https://access.redhat.com/solutions/6964304", "Remediation: [hint] Comment out CIFS entries to proceed with the upgrade.", "Key: d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.", "Summary: Support for the following RHEL 9 device drivers has been removed in RHEL 10:", " - qla3xxx", " - vmw_pvrdma", "", "Related links:", " - Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\": https://access.redhat.com/solutions/6971716", " - Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\": https://access.redhat.com/solutions/5436131", "Key: 48e04852631245aa4afee9adcdc7c2375b8cffb8", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Legacy network configuration found", "Summary: Network configuration files in legacy \"ifcfg\" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:", " - /etc/sysconfig/network-scripts/ifcfg-eth0", "Related links:", " - How to migrate the connection from ifcfg to NetworkManager keyfile plugin?: https://access.redhat.com/solutions/7083803", " - nmcli(1) manual, describes \"connection migrate\" sub-command.: https://networkmanager.dev/docs/api/latest/nmcli.html", " - nm-settings-ifcfg-rh(5), description of the \"ifcfg\" format: https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html", " - nm-settings-keyfile(5), description of the \"keyfile\" format: https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html", "Remediation: [hint] Convert the configuration into NetworkManager native \"keyfile\" format.", "[command] nmcli connection migrate /etc/sysconfig/network-scripts/ifcfg-eth0", "Key: 7de70b43c3c9d20075e30894ac24a4c4e2d70837", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Use of NFS detected. Upgrade can't proceed", "Summary: NFS is currently not supported by the inplace upgrade.", "We have found NFS usage at the following locations:", "- NFS shares found in /etc/fstab:", " - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat", " - nest.test.redhat.com:/mnt/qa /mnt/qa", " - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive", " - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist", " - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew", " - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch", "", "Related links:", " - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006", "Remediation: [hint] Disable NFS temporarily for the upgrade if possible.", "Key: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "----------------------------------------", "Risk Factor: high ", "Title: GRUB2 core will be automatically updated during the upgrade", "Summary: On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", "Key: ac7030e05d2ee248d34f08a9fa040b352bc410a3", "----------------------------------------", "Risk Factor: high ", "Title: Upgrade is unsupported", "Summary: Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.", "", "Key: 9e5088e3c1f371e020ec777c3d86578f4be143cf", "----------------------------------------", "Risk Factor: high ", "Title: Leapp detected a processor which is no longer maintained in RHEL 10.", "Summary: The following processors are no longer maintained in RHEL 10:", " - HASWELL_X", "", "Key: 9dde4bcd8b458bd6803462216785df3a1476c1f8", "----------------------------------------", "Risk Factor: medium ", "Title: Berkeley DB (libdb) has been detected on your system", "Summary: Libdb was marked as deprecated in RHEL-9 and in RHEL-10 is not included anymore. There are a couple of alternatives in RHEL-10; the applications that depend on libdb will not work. Such applications must implement another type of backend storage. And migrate existing data to the new database format.", "Related links:", " - Migrating to a RHEL 10 without libdb: https://access.redhat.com/articles/7099256", "Remediation: [hint] Back up your data before proceeding with the data upgrade/migration. For the conversion, the tool db_converter from the libdb-utils rpm could be used. This database format conversion must be performed before the system upgrade. The db_converter is not available in RHEL 10 systems. For more information, see the provided article.", "Key: fdc8f5b084e95922a4f59485a807a92cae2fc738", "----------------------------------------", "Risk Factor: low ", "Title: SElinux will be set to permissive mode", "Summary: SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", "Remediation: [hint] Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.", "Key: 39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", "----------------------------------------", "Risk Factor: info ", "Title: Excluded target system repositories", "Summary: The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.", "- codeready-builder-for-rhel-10-s390x-rpms", "- rhui-codeready-builder-for-rhel-10-x86_64-rhui-rpms", "- codeready-builder-for-rhel-10-ppc64le-rpms", "- codeready-builder-beta-for-rhel-10-s390x-rpms", "- codeready-builder-for-rhel-10-x86_64-rpms", "- codeready-builder-for-rhel-10-ppc64le-eus-rpms", "- codeready-builder-for-rhel-10-aarch64-rpms", "- rhui-codeready-builder-for-rhel-10-aarch64-rhui-rpms", "- crb", "- codeready-builder-for-rhel-10-s390x-eus-rpms", "- codeready-builder-for-rhel-10-x86_64-eus-rpms", "- codeready-builder-beta-for-rhel-10-aarch64-rpms", "- codeready-builder-for-rhel-10-rhui-rpms", "- codeready-builder-beta-for-rhel-10-x86_64-rpms", "- codeready-builder-for-rhel-10-aarch64-eus-rpms", "- codeready-builder-beta-for-rhel-10-ppc64le-rpms", "Remediation: [hint] If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "Key: 1b9132cb2362ae7830e48eee7811be9527747de8", "----------------------------------------", "Risk Factor: info ", "Title: SElinux relabeling will be scheduled", "Summary: SElinux relabeling will be scheduled as the status is permissive/enforcing.", "Key: 8fb81863f8413bd617c2a55b69b8e10ff03d7c72", "----------------------------------------", ""]}, "changed": false} TASK [infra.leapp.common : parse_leapp_report | Check for inhibitors] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:32 skipping: [managed-node01] => (item={'audience': 'sysadmin', 'detail': {'remediations': [{'context': 'If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).', 'type': 'hint'}]}, 'groups': ['repository', 'failure'], 'key': '1b9132cb2362ae7830e48eee7811be9527747de8', 'severity': 'info', 'summary': 'The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-for-rhel-10-s390x-rpms\n- rhui-codeready-builder-for-rhel-10-x86_64-rhui-rpms\n- codeready-builder-for-rhel-10-ppc64le-rpms\n- codeready-builder-beta-for-rhel-10-s390x-rpms\n- codeready-builder-for-rhel-10-x86_64-rpms\n- codeready-builder-for-rhel-10-ppc64le-eus-rpms\n- codeready-builder-for-rhel-10-aarch64-rpms\n- rhui-codeready-builder-for-rhel-10-aarch64-rhui-rpms\n- crb\n- codeready-builder-for-rhel-10-s390x-eus-rpms\n- codeready-builder-for-rhel-10-x86_64-eus-rpms\n- codeready-builder-beta-for-rhel-10-aarch64-rpms\n- codeready-builder-for-rhel-10-rhui-rpms\n- codeready-builder-beta-for-rhel-10-x86_64-rpms\n- codeready-builder-for-rhel-10-aarch64-eus-rpms\n- codeready-builder-beta-for-rhel-10-ppc64le-rpms', 'title': 'Excluded target system repositories', 'timeStamp': '2026-01-12T13:58:02.104249Z', 'hostname': 'managed-node01', 'actor': 'repositories_blacklist', 'id': 'ec3586a9593df495fe5ed948919727fba1ca1707034d3daaff201c94ac9b7524'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "repositories_blacklist", "audience": "sysadmin", "detail": {"remediations": [{"context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "type": "hint"}]}, "groups": ["repository", "failure"], "hostname": "managed-node01", "id": "ec3586a9593df495fe5ed948919727fba1ca1707034d3daaff201c94ac9b7524", "key": "1b9132cb2362ae7830e48eee7811be9527747de8", "severity": "info", "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-for-rhel-10-s390x-rpms\n- rhui-codeready-builder-for-rhel-10-x86_64-rhui-rpms\n- codeready-builder-for-rhel-10-ppc64le-rpms\n- codeready-builder-beta-for-rhel-10-s390x-rpms\n- codeready-builder-for-rhel-10-x86_64-rpms\n- codeready-builder-for-rhel-10-ppc64le-eus-rpms\n- codeready-builder-for-rhel-10-aarch64-rpms\n- rhui-codeready-builder-for-rhel-10-aarch64-rhui-rpms\n- crb\n- codeready-builder-for-rhel-10-s390x-eus-rpms\n- codeready-builder-for-rhel-10-x86_64-eus-rpms\n- codeready-builder-beta-for-rhel-10-aarch64-rpms\n- codeready-builder-for-rhel-10-rhui-rpms\n- codeready-builder-beta-for-rhel-10-x86_64-rpms\n- codeready-builder-for-rhel-10-aarch64-eus-rpms\n- codeready-builder-beta-for-rhel-10-ppc64le-rpms", "timeStamp": "2026-01-12T13:58:02.104249Z", "title": "Excluded target system repositories"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'audience': 'sysadmin', 'groups': ['selinux', 'security'], 'key': '8fb81863f8413bd617c2a55b69b8e10ff03d7c72', 'severity': 'info', 'summary': 'SElinux relabeling will be scheduled as the status is permissive/enforcing.', 'title': 'SElinux relabeling will be scheduled', 'timeStamp': '2026-01-12T13:58:04.158101Z', 'hostname': 'managed-node01', 'actor': 'check_se_linux', 'id': '47949c93f5c86d361e1e10aaacb80c7741a43236819a51e45781dcd1043a3236'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_se_linux", "audience": "sysadmin", "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "47949c93f5c86d361e1e10aaacb80c7741a43236819a51e45781dcd1043a3236", "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", "severity": "info", "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", "timeStamp": "2026-01-12T13:58:04.158101Z", "title": "SElinux relabeling will be scheduled"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'audience': 'sysadmin', 'detail': {'remediations': [{'context': 'Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the "/root/tmp_leapp_py3" SElinux warnings.', 'type': 'hint'}]}, 'groups': ['selinux', 'security'], 'key': '39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f', 'severity': 'low', 'summary': 'SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.', 'title': 'SElinux will be set to permissive mode', 'timeStamp': '2026-01-12T13:58:04.162042Z', 'hostname': 'managed-node01', 'actor': 'check_se_linux', 'id': '4cd9064b70ffafa8020e1442a64d9a04df136f4d545176eec0432466ce5c1e70'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_se_linux", "audience": "sysadmin", "detail": {"remediations": [{"context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.", "type": "hint"}]}, "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "4cd9064b70ffafa8020e1442a64d9a04df136f4d545176eec0432466ce5c1e70", "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", "severity": "low", "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", "timeStamp": "2026-01-12T13:58:04.162042Z", "title": "SElinux will be set to permissive mode"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'audience': 'sysadmin', 'groups': ['boot'], 'key': 'ac7030e05d2ee248d34f08a9fa040b352bc410a3', 'severity': 'high', 'summary': 'On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running "grub2-install" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.', 'title': 'GRUB2 core will be automatically updated during the upgrade', 'timeStamp': '2026-01-12T13:58:04.398323Z', 'hostname': 'managed-node01', 'actor': 'check_grub_core', 'id': '81fa8268605976dcca65bd169419db8fe87cb3148b53cb9d77bda2f10296f14b'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_grub_core", "audience": "sysadmin", "groups": ["boot"], "hostname": "managed-node01", "id": "81fa8268605976dcca65bd169419db8fe87cb3148b53cb9d77bda2f10296f14b", "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", "severity": "high", "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", "timeStamp": "2026-01-12T13:58:04.398323Z", "title": "GRUB2 core will be automatically updated during the upgrade"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'audience': 'sysadmin', 'groups': ['upgrade process', 'sanity'], 'key': '9e5088e3c1f371e020ec777c3d86578f4be143cf', 'severity': 'high', 'summary': 'Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.\n', 'title': 'Upgrade is unsupported', 'timeStamp': '2026-01-12T13:58:04.868626Z', 'hostname': 'managed-node01', 'actor': 'unsupported_upgrade_check', 'id': 'b657ccde7581ec3383f986ec6c3c32bc1d1086d22e7d4f39740bef33b01d3af3'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "unsupported_upgrade_check", "audience": "sysadmin", "groups": ["upgrade process", "sanity"], "hostname": "managed-node01", "id": "b657ccde7581ec3383f986ec6c3c32bc1d1086d22e7d4f39740bef33b01d3af3", "key": "9e5088e3c1f371e020ec777c3d86578f4be143cf", "severity": "high", "summary": "Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.\n", "timeStamp": "2026-01-12T13:58:04.868626Z", "title": "Upgrade is unsupported"}, "skip_reason": "Conditional result was False"} ok: [managed-node01] => (item={'audience': 'sysadmin', 'detail': {'external': [{'title': 'Leapp upgrade failed with error "Inhibitor: Use of CIFS detected. Upgrade cannot proceed"', 'url': 'https://access.redhat.com/solutions/6964304'}], 'related_resources': [{'scheme': 'file', 'title': '/etc/fstab'}], 'remediations': [{'context': 'Comment out CIFS entries to proceed with the upgrade.', 'type': 'hint'}]}, 'groups': ['filesystem', 'network', 'inhibitor'], 'key': 'd0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a', 'severity': 'high', 'summary': 'CIFS is currently not supported by the inplace upgrade.', 'title': "Use of CIFS detected. Upgrade can't proceed", 'timeStamp': '2026-01-12T13:58:05.022466Z', 'hostname': 'managed-node01', 'actor': 'check_cifs', 'id': '7d1a4b2859cfa9a9e47e0986278a60695a41893cd51aab1ec41188d0316b902f'}) => {"ansible_facts": {"leapp_inhibitors": [{"actor": "check_cifs", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "7d1a4b2859cfa9a9e47e0986278a60695a41893cd51aab1ec41188d0316b902f", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2026-01-12T13:58:05.022466Z", "title": "Use of CIFS detected. Upgrade can't proceed"}], "upgrade_inhibited": true}, "ansible_loop_var": "item", "changed": false, "item": {"actor": "check_cifs", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "7d1a4b2859cfa9a9e47e0986278a60695a41893cd51aab1ec41188d0316b902f", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2026-01-12T13:58:05.022466Z", "title": "Use of CIFS detected. Upgrade can't proceed"}} ok: [managed-node01] => (item={'audience': 'sysadmin', 'detail': {'external': [{'title': 'Leapp preupgrade getting "Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed."', 'url': 'https://access.redhat.com/solutions/6971716'}, {'title': 'Leapp upgrade fail with error "Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed."', 'url': 'https://access.redhat.com/solutions/5436131'}]}, 'groups': ['kernel', 'drivers', 'inhibitor'], 'key': '48e04852631245aa4afee9adcdc7c2375b8cffb8', 'severity': 'high', 'summary': 'Support for the following RHEL 9 device drivers has been removed in RHEL 10:\n - qla3xxx\n - vmw_pvrdma\n', 'title': 'Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.', 'timeStamp': '2026-01-12T13:58:05.219121Z', 'hostname': 'managed-node01', 'actor': 'check_detected_devices_and_drivers', 'id': '209ca2ad519594527e5c95cd2a1c08c66833738d593d41ff0aa73d82ef3c72db'}) => {"ansible_facts": {"leapp_inhibitors": [{"actor": "check_cifs", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "7d1a4b2859cfa9a9e47e0986278a60695a41893cd51aab1ec41188d0316b902f", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2026-01-12T13:58:05.022466Z", "title": "Use of CIFS detected. Upgrade can't proceed"}, {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "209ca2ad519594527e5c95cd2a1c08c66833738d593d41ff0aa73d82ef3c72db", "key": "48e04852631245aa4afee9adcdc7c2375b8cffb8", "severity": "high", "summary": "Support for the following RHEL 9 device drivers has been removed in RHEL 10:\n - qla3xxx\n - vmw_pvrdma\n", "timeStamp": "2026-01-12T13:58:05.219121Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed."}], "upgrade_inhibited": true}, "ansible_loop_var": "item", "changed": false, "item": {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "209ca2ad519594527e5c95cd2a1c08c66833738d593d41ff0aa73d82ef3c72db", "key": "48e04852631245aa4afee9adcdc7c2375b8cffb8", "severity": "high", "summary": "Support for the following RHEL 9 device drivers has been removed in RHEL 10:\n - qla3xxx\n - vmw_pvrdma\n", "timeStamp": "2026-01-12T13:58:05.219121Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed."}} skipping: [managed-node01] => (item={'audience': 'sysadmin', 'groups': ['kernel', 'boot'], 'key': '9dde4bcd8b458bd6803462216785df3a1476c1f8', 'severity': 'high', 'summary': 'The following processors are no longer maintained in RHEL 10:\n - HASWELL_X\n', 'title': 'Leapp detected a processor which is no longer maintained in RHEL 10.', 'timeStamp': '2026-01-12T13:58:05.221945Z', 'hostname': 'managed-node01', 'actor': 'check_detected_devices_and_drivers', 'id': '6eceee9a6ee749acad9a91912df006364dd9975d595a8ef834a9b74dba613529'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "groups": ["kernel", "boot"], "hostname": "managed-node01", "id": "6eceee9a6ee749acad9a91912df006364dd9975d595a8ef834a9b74dba613529", "key": "9dde4bcd8b458bd6803462216785df3a1476c1f8", "severity": "high", "summary": "The following processors are no longer maintained in RHEL 10:\n - HASWELL_X\n", "timeStamp": "2026-01-12T13:58:05.221945Z", "title": "Leapp detected a processor which is no longer maintained in RHEL 10."}, "skip_reason": "Conditional result was False"} ok: [managed-node01] => (item={'audience': 'sysadmin', 'detail': {'external': [{'title': 'How to migrate the connection from ifcfg to NetworkManager keyfile plugin?', 'url': 'https://access.redhat.com/solutions/7083803'}, {'title': 'nmcli(1) manual, describes "connection migrate" sub-command.', 'url': 'https://networkmanager.dev/docs/api/latest/nmcli.html'}, {'title': 'nm-settings-ifcfg-rh(5), description of the "ifcfg" format', 'url': 'https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html'}, {'title': 'nm-settings-keyfile(5), description of the "keyfile" format', 'url': 'https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html'}], 'related_resources': [{'scheme': 'package', 'title': 'NetworkManager'}, {'scheme': 'file', 'title': '/etc/sysconfig/network-scripts/ifcfg-eth0'}], 'remediations': [{'context': 'Convert the configuration into NetworkManager native "keyfile" format.', 'type': 'hint'}, {'context': ['nmcli', 'connection', 'migrate', '/etc/sysconfig/network-scripts/ifcfg-eth0'], 'type': 'command'}]}, 'groups': ['network', 'services', 'inhibitor'], 'key': '7de70b43c3c9d20075e30894ac24a4c4e2d70837', 'severity': 'high', 'summary': 'Network configuration files in legacy "ifcfg" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:\n - /etc/sysconfig/network-scripts/ifcfg-eth0', 'title': 'Legacy network configuration found', 'timeStamp': '2026-01-12T13:58:05.501987Z', 'hostname': 'managed-node01', 'actor': 'network_deprecations', 'id': 'f475031f70e687cdddd38e4e97b94cbcc771b878102484e33af86b6a12ae64f0'}) => {"ansible_facts": {"leapp_inhibitors": [{"actor": "check_cifs", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "7d1a4b2859cfa9a9e47e0986278a60695a41893cd51aab1ec41188d0316b902f", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2026-01-12T13:58:05.022466Z", "title": "Use of CIFS detected. Upgrade can't proceed"}, {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "209ca2ad519594527e5c95cd2a1c08c66833738d593d41ff0aa73d82ef3c72db", "key": "48e04852631245aa4afee9adcdc7c2375b8cffb8", "severity": "high", "summary": "Support for the following RHEL 9 device drivers has been removed in RHEL 10:\n - qla3xxx\n - vmw_pvrdma\n", "timeStamp": "2026-01-12T13:58:05.219121Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed."}, {"actor": "network_deprecations", "audience": "sysadmin", "detail": {"external": [{"title": "How to migrate the connection from ifcfg to NetworkManager keyfile plugin?", "url": "https://access.redhat.com/solutions/7083803"}, {"title": "nmcli(1) manual, describes \"connection migrate\" sub-command.", "url": "https://networkmanager.dev/docs/api/latest/nmcli.html"}, {"title": "nm-settings-ifcfg-rh(5), description of the \"ifcfg\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html"}, {"title": "nm-settings-keyfile(5), description of the \"keyfile\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html"}], "related_resources": [{"scheme": "package", "title": "NetworkManager"}, {"scheme": "file", "title": "/etc/sysconfig/network-scripts/ifcfg-eth0"}], "remediations": [{"context": "Convert the configuration into NetworkManager native \"keyfile\" format.", "type": "hint"}, {"context": ["nmcli", "connection", "migrate", "/etc/sysconfig/network-scripts/ifcfg-eth0"], "type": "command"}]}, "groups": ["network", "services", "inhibitor"], "hostname": "managed-node01", "id": "f475031f70e687cdddd38e4e97b94cbcc771b878102484e33af86b6a12ae64f0", "key": "7de70b43c3c9d20075e30894ac24a4c4e2d70837", "severity": "high", "summary": "Network configuration files in legacy \"ifcfg\" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:\n - /etc/sysconfig/network-scripts/ifcfg-eth0", "timeStamp": "2026-01-12T13:58:05.501987Z", "title": "Legacy network configuration found"}], "upgrade_inhibited": true}, "ansible_loop_var": "item", "changed": false, "item": {"actor": "network_deprecations", "audience": "sysadmin", "detail": {"external": [{"title": "How to migrate the connection from ifcfg to NetworkManager keyfile plugin?", "url": "https://access.redhat.com/solutions/7083803"}, {"title": "nmcli(1) manual, describes \"connection migrate\" sub-command.", "url": "https://networkmanager.dev/docs/api/latest/nmcli.html"}, {"title": "nm-settings-ifcfg-rh(5), description of the \"ifcfg\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html"}, {"title": "nm-settings-keyfile(5), description of the \"keyfile\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html"}], "related_resources": [{"scheme": "package", "title": "NetworkManager"}, {"scheme": "file", "title": "/etc/sysconfig/network-scripts/ifcfg-eth0"}], "remediations": [{"context": "Convert the configuration into NetworkManager native \"keyfile\" format.", "type": "hint"}, {"context": ["nmcli", "connection", "migrate", "/etc/sysconfig/network-scripts/ifcfg-eth0"], "type": "command"}]}, "groups": ["network", "services", "inhibitor"], "hostname": "managed-node01", "id": "f475031f70e687cdddd38e4e97b94cbcc771b878102484e33af86b6a12ae64f0", "key": "7de70b43c3c9d20075e30894ac24a4c4e2d70837", "severity": "high", "summary": "Network configuration files in legacy \"ifcfg\" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:\n - /etc/sysconfig/network-scripts/ifcfg-eth0", "timeStamp": "2026-01-12T13:58:05.501987Z", "title": "Legacy network configuration found"}} skipping: [managed-node01] => (item={'audience': 'sysadmin', 'detail': {'external': [{'title': 'Migrating to a RHEL 10 without libdb', 'url': 'https://access.redhat.com/articles/7099256'}], 'related_resources': [{'scheme': 'package', 'title': 'libdb'}], 'remediations': [{'context': 'Back up your data before proceeding with the data upgrade/migration. For the conversion, the tool db_converter from the libdb-utils rpm could be used. This database format conversion must be performed before the system upgrade. The db_converter is not available in RHEL 10 systems. For more information, see the provided article.', 'type': 'hint'}]}, 'groups': ['services'], 'key': 'fdc8f5b084e95922a4f59485a807a92cae2fc738', 'severity': 'medium', 'summary': 'Libdb was marked as deprecated in RHEL-9 and in RHEL-10 is not included anymore. There are a couple of alternatives in RHEL-10; the applications that depend on libdb will not work. Such applications must implement another type of backend storage. And migrate existing data to the new database format.', 'title': 'Berkeley DB (libdb) has been detected on your system', 'timeStamp': '2026-01-12T13:58:05.798708Z', 'hostname': 'managed-node01', 'actor': 'libdb_check', 'id': '9c5e4acaa43d37141c8b127264783908c6bdccbe4290183cf0e8beb2ae6c7a34'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "libdb_check", "audience": "sysadmin", "detail": {"external": [{"title": "Migrating to a RHEL 10 without libdb", "url": "https://access.redhat.com/articles/7099256"}], "related_resources": [{"scheme": "package", "title": "libdb"}], "remediations": [{"context": "Back up your data before proceeding with the data upgrade/migration. For the conversion, the tool db_converter from the libdb-utils rpm could be used. This database format conversion must be performed before the system upgrade. The db_converter is not available in RHEL 10 systems. For more information, see the provided article.", "type": "hint"}]}, "groups": ["services"], "hostname": "managed-node01", "id": "9c5e4acaa43d37141c8b127264783908c6bdccbe4290183cf0e8beb2ae6c7a34", "key": "fdc8f5b084e95922a4f59485a807a92cae2fc738", "severity": "medium", "summary": "Libdb was marked as deprecated in RHEL-9 and in RHEL-10 is not included anymore. There are a couple of alternatives in RHEL-10; the applications that depend on libdb will not work. Such applications must implement another type of backend storage. And migrate existing data to the new database format.", "timeStamp": "2026-01-12T13:58:05.798708Z", "title": "Berkeley DB (libdb) has been detected on your system"}, "skip_reason": "Conditional result was False"} ok: [managed-node01] => (item={'audience': 'sysadmin', 'detail': {'external': [{'title': 'Why does leapp upgrade fail on detecting NFS during upgrade?', 'url': 'https://access.redhat.com/solutions/6964006'}], 'related_resources': [{'scheme': 'file', 'title': '/etc/fstab'}], 'remediations': [{'context': 'Disable NFS temporarily for the upgrade if possible.', 'type': 'hint'}]}, 'groups': ['filesystem', 'network', 'inhibitor'], 'key': '9881b25faceeeaa7a6478bcdac29afd7f6baaaed', 'severity': 'high', 'summary': 'NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n', 'title': "Use of NFS detected. Upgrade can't proceed", 'timeStamp': '2026-01-12T13:58:06.297471Z', 'hostname': 'managed-node01', 'actor': 'check_nfs', 'id': '830bde6c37fe89aa3306731ef54dcc83b5ee7564cfeeb1af8e4e7d82f037b5a8'}) => {"ansible_facts": {"leapp_inhibitors": [{"actor": "check_cifs", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "7d1a4b2859cfa9a9e47e0986278a60695a41893cd51aab1ec41188d0316b902f", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2026-01-12T13:58:05.022466Z", "title": "Use of CIFS detected. Upgrade can't proceed"}, {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "209ca2ad519594527e5c95cd2a1c08c66833738d593d41ff0aa73d82ef3c72db", "key": "48e04852631245aa4afee9adcdc7c2375b8cffb8", "severity": "high", "summary": "Support for the following RHEL 9 device drivers has been removed in RHEL 10:\n - qla3xxx\n - vmw_pvrdma\n", "timeStamp": "2026-01-12T13:58:05.219121Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed."}, {"actor": "network_deprecations", "audience": "sysadmin", "detail": {"external": [{"title": "How to migrate the connection from ifcfg to NetworkManager keyfile plugin?", "url": "https://access.redhat.com/solutions/7083803"}, {"title": "nmcli(1) manual, describes \"connection migrate\" sub-command.", "url": "https://networkmanager.dev/docs/api/latest/nmcli.html"}, {"title": "nm-settings-ifcfg-rh(5), description of the \"ifcfg\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html"}, {"title": "nm-settings-keyfile(5), description of the \"keyfile\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html"}], "related_resources": [{"scheme": "package", "title": "NetworkManager"}, {"scheme": "file", "title": "/etc/sysconfig/network-scripts/ifcfg-eth0"}], "remediations": [{"context": "Convert the configuration into NetworkManager native \"keyfile\" format.", "type": "hint"}, {"context": ["nmcli", "connection", "migrate", "/etc/sysconfig/network-scripts/ifcfg-eth0"], "type": "command"}]}, "groups": ["network", "services", "inhibitor"], "hostname": "managed-node01", "id": "f475031f70e687cdddd38e4e97b94cbcc771b878102484e33af86b6a12ae64f0", "key": "7de70b43c3c9d20075e30894ac24a4c4e2d70837", "severity": "high", "summary": "Network configuration files in legacy \"ifcfg\" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:\n - /etc/sysconfig/network-scripts/ifcfg-eth0", "timeStamp": "2026-01-12T13:58:05.501987Z", "title": "Legacy network configuration found"}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "830bde6c37fe89aa3306731ef54dcc83b5ee7564cfeeb1af8e4e7d82f037b5a8", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n", "timeStamp": "2026-01-12T13:58:06.297471Z", "title": "Use of NFS detected. Upgrade can't proceed"}], "upgrade_inhibited": true}, "ansible_loop_var": "item", "changed": false, "item": {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "830bde6c37fe89aa3306731ef54dcc83b5ee7564cfeeb1af8e4e7d82f037b5a8", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n", "timeStamp": "2026-01-12T13:58:06.297471Z", "title": "Use of NFS detected. Upgrade can't proceed"}} TASK [infra.leapp.common : parse_leapp_report | Collect inhibitors] ************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:44 ok: [managed-node01] => {"changed": false, "cmd": ["awk", "/\\(inhibitor\\)/,/^-------/", "/var/log/leapp/leapp-report.txt"], "delta": "0:00:00.004255", "end": "2026-01-12 08:58:43.749410", "failed_when_result": false, "msg": "", "rc": 0, "start": "2026-01-12 08:58:43.745155", "stderr": "", "stderr_lines": [], "stdout": "Risk Factor: high (inhibitor)\nTitle: Use of CIFS detected. Upgrade can't proceed\nSummary: CIFS is currently not supported by the inplace upgrade.\nRelated links:\n - Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\": https://access.redhat.com/solutions/6964304\nRemediation: [hint] Comment out CIFS entries to proceed with the upgrade.\nKey: d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a\n----------------------------------------\nRisk Factor: high (inhibitor)\nTitle: Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\nSummary: Support for the following RHEL 9 device drivers has been removed in RHEL 10:\n - qla3xxx\n - vmw_pvrdma\n\nRelated links:\n - Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\": https://access.redhat.com/solutions/6971716\n - Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\": https://access.redhat.com/solutions/5436131\nKey: 48e04852631245aa4afee9adcdc7c2375b8cffb8\n----------------------------------------\nRisk Factor: high (inhibitor)\nTitle: Legacy network configuration found\nSummary: Network configuration files in legacy \"ifcfg\" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:\n - /etc/sysconfig/network-scripts/ifcfg-eth0\nRelated links:\n - How to migrate the connection from ifcfg to NetworkManager keyfile plugin?: https://access.redhat.com/solutions/7083803\n - nmcli(1) manual, describes \"connection migrate\" sub-command.: https://networkmanager.dev/docs/api/latest/nmcli.html\n - nm-settings-ifcfg-rh(5), description of the \"ifcfg\" format: https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html\n - nm-settings-keyfile(5), description of the \"keyfile\" format: https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html\nRemediation: [hint] Convert the configuration into NetworkManager native \"keyfile\" format.\n[command] nmcli connection migrate /etc/sysconfig/network-scripts/ifcfg-eth0\nKey: 7de70b43c3c9d20075e30894ac24a4c4e2d70837\n----------------------------------------\nRisk Factor: high (inhibitor)\nTitle: Use of NFS detected. Upgrade can't proceed\nSummary: NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n\nRelated links:\n - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006\nRemediation: [hint] Disable NFS temporarily for the upgrade if possible.\nKey: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed\n----------------------------------------", "stdout_lines": ["Risk Factor: high (inhibitor)", "Title: Use of CIFS detected. Upgrade can't proceed", "Summary: CIFS is currently not supported by the inplace upgrade.", "Related links:", " - Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\": https://access.redhat.com/solutions/6964304", "Remediation: [hint] Comment out CIFS entries to proceed with the upgrade.", "Key: d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.", "Summary: Support for the following RHEL 9 device drivers has been removed in RHEL 10:", " - qla3xxx", " - vmw_pvrdma", "", "Related links:", " - Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\": https://access.redhat.com/solutions/6971716", " - Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\": https://access.redhat.com/solutions/5436131", "Key: 48e04852631245aa4afee9adcdc7c2375b8cffb8", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Legacy network configuration found", "Summary: Network configuration files in legacy \"ifcfg\" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:", " - /etc/sysconfig/network-scripts/ifcfg-eth0", "Related links:", " - How to migrate the connection from ifcfg to NetworkManager keyfile plugin?: https://access.redhat.com/solutions/7083803", " - nmcli(1) manual, describes \"connection migrate\" sub-command.: https://networkmanager.dev/docs/api/latest/nmcli.html", " - nm-settings-ifcfg-rh(5), description of the \"ifcfg\" format: https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html", " - nm-settings-keyfile(5), description of the \"keyfile\" format: https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html", "Remediation: [hint] Convert the configuration into NetworkManager native \"keyfile\" format.", "[command] nmcli connection migrate /etc/sysconfig/network-scripts/ifcfg-eth0", "Key: 7de70b43c3c9d20075e30894ac24a4c4e2d70837", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Use of NFS detected. Upgrade can't proceed", "Summary: NFS is currently not supported by the inplace upgrade.", "We have found NFS usage at the following locations:", "- NFS shares found in /etc/fstab:", " - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat", " - nest.test.redhat.com:/mnt/qa /mnt/qa", " - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive", " - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist", " - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew", " - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch", "", "Related links:", " - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006", "Remediation: [hint] Disable NFS temporarily for the upgrade if possible.", "Key: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "----------------------------------------"]} TASK [infra.leapp.common : parse_leapp_report | Collect high errors] *********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:53 ok: [managed-node01] => {"changed": false, "cmd": ["awk", "/high \\(error\\)/,/^-------/", "/var/log/leapp/leapp-report.txt"], "delta": "0:00:00.004249", "end": "2026-01-12 08:58:44.125307", "failed_when_result": false, "msg": "", "rc": 0, "start": "2026-01-12 08:58:44.121058", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} TASK [infra.leapp.analysis : Set stats for leapp_inhibitors] ******************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:17 ok: [managed-node01] => {"ansible_stats": {"aggregate": true, "data": {"leapp_inhibitors": [{"actor": "check_cifs", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "7d1a4b2859cfa9a9e47e0986278a60695a41893cd51aab1ec41188d0316b902f", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2026-01-12T13:58:05.022466Z", "title": "Use of CIFS detected. Upgrade can't proceed"}, {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "209ca2ad519594527e5c95cd2a1c08c66833738d593d41ff0aa73d82ef3c72db", "key": "48e04852631245aa4afee9adcdc7c2375b8cffb8", "severity": "high", "summary": "Support for the following RHEL 9 device drivers has been removed in RHEL 10:\n - qla3xxx\n - vmw_pvrdma\n", "timeStamp": "2026-01-12T13:58:05.219121Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed."}, {"actor": "network_deprecations", "audience": "sysadmin", "detail": {"external": [{"title": "How to migrate the connection from ifcfg to NetworkManager keyfile plugin?", "url": "https://access.redhat.com/solutions/7083803"}, {"title": "nmcli(1) manual, describes \"connection migrate\" sub-command.", "url": "https://networkmanager.dev/docs/api/latest/nmcli.html"}, {"title": "nm-settings-ifcfg-rh(5), description of the \"ifcfg\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html"}, {"title": "nm-settings-keyfile(5), description of the \"keyfile\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html"}], "related_resources": [{"scheme": "package", "title": "NetworkManager"}, {"scheme": "file", "title": "/etc/sysconfig/network-scripts/ifcfg-eth0"}], "remediations": [{"context": "Convert the configuration into NetworkManager native \"keyfile\" format.", "type": "hint"}, {"context": ["nmcli", "connection", "migrate", "/etc/sysconfig/network-scripts/ifcfg-eth0"], "type": "command"}]}, "groups": ["network", "services", "inhibitor"], "hostname": "managed-node01", "id": "f475031f70e687cdddd38e4e97b94cbcc771b878102484e33af86b6a12ae64f0", "key": "7de70b43c3c9d20075e30894ac24a4c4e2d70837", "severity": "high", "summary": "Network configuration files in legacy \"ifcfg\" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:\n - /etc/sysconfig/network-scripts/ifcfg-eth0", "timeStamp": "2026-01-12T13:58:05.501987Z", "title": "Legacy network configuration found"}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "830bde6c37fe89aa3306731ef54dcc83b5ee7564cfeeb1af8e4e7d82f037b5a8", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n", "timeStamp": "2026-01-12T13:58:06.297471Z", "title": "Use of NFS detected. Upgrade can't proceed"}]}, "per_host": false}, "changed": false} TASK [infra.leapp.analysis : Notify analysis report is done handler] *********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:22 NOTIFIED HANDLER infra.leapp.analysis : Preupgrade analysis report is done for managed-node01 NOTIFIED HANDLER infra.leapp.analysis : Display inhibitors for managed-node01 NOTIFIED HANDLER infra.leapp.analysis : Display errors for managed-node01 changed: [managed-node01] => {"changed": true, "msg": "All assertions passed"} TASK [common_upgrade_tasks | Flush handlers] *********************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:44 META: triggered running handlers for managed-node01 RUNNING HANDLER [infra.leapp.common : Check for log file] ********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:3 ok: [managed-node01] => {"changed": false, "stat": {"atime": 1768226252.5798435, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 32, "charset": "us-ascii", "checksum": "9d6d23eca8886fe96d957f46367a202ad730a8e9", "ctime": 1768226286.7117836, "dev": 51716, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 192938126, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1768226286.7117836, "nlink": 1, "path": "/var/log/ripu/ripu.log", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 14218, "uid": 0, "version": "3204060818", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} RUNNING HANDLER [infra.leapp.common : Add end time to log file] **************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:9 changed: [managed-node01] => {"backup": "", "changed": true, "msg": "line added"} RUNNING HANDLER [infra.leapp.common : Slurp ripu.log file] ********************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:19 ok: [managed-node01] => {"changed": false, "content": "RIPU preupgrade analysis
Job started at 2026-01-12T13:57:31Z

============================================================
                    UNSUPPORTED UPGRADE                     
============================================================

Variable LEAPP_UNSUPPORTED has been detected. Proceeding at your own risk.
Development variables have been detected:
- LEAPP_DEVEL_RPMS_ALL_SIGNED=1

============================================================
                    UNSUPPORTED UPGRADE                     
============================================================

==> Processing phase `configuration_phase`
====> * ipu_workflow_config
        IPU workflow config actor
==> Processing phase `FactsCollection`
====> * open_ssl_config_scanner
        Read an OpenSSL configuration file for further analysis.
====> * scan_pam_user_db
        Scan the PAM service folder for the location of pam_userdb databases
====> * storage_scanner
        Provides data about storage settings.
====> * sssd_facts
        Check SSSD configuration for changes in RHEL10 and report them in model.
====> * scan_source_boot_entry
        Scan the default boot entry of the source system.
====> * transaction_workarounds
        Provides additional RPM transaction tasks based on bundled RPM packages.
====> * repository_mapping
        Produces message containing repository mapping based on provided file.
====> * ifcfg_scanner
        Scan ifcfg files with legacy network configuration
====> * root_scanner
        Scan the system root directory and produce a message containing
====> * scanclienablerepo
        Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.
====> * system_facts
        Provides data about many facts from system.
====> * get_enabled_modules
        Provides data about which module streams are enabled on the source system.
====> * satellite_upgrade_services
        Reconfigure Satellite services
====> * scan_target_os_image
        Scans the provided target OS ISO image to use as a content source for the IPU, if any.
====> * luks_scanner
        Provides data about active LUKS devices.
====> * xfs_info_scanner
        This actor scans all mounted mountpoints for XFS information.
====> * rpm_scanner
        Provides data about installed RPM Packages.
====> * scan_systemd_source
        Provides info about systemd on the source system
====> * scan_default_initramfs
        Scan details of the default boot entry's initramfs image.
====> * scancryptopolicies
        Scan information about system wide set crypto policies including:
====> * copy_dnf_conf_into_target_userspace
        Copy dnf.conf into target userspace
====> * scan_grub_device_name
        Find the name of the block devices where GRUB is located
====> * scan_custom_modifications_actor
        Collects information about files in leapp directories that have been modified or newly added.
====> * scan_hybrid_image_azure
        Check if the system is using Azure hybrid image.
====> * scan_custom_repofile
        Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.
====> * network_manager_read_config
        Provides data about NetworkManager configuration.
====> * scandasd
        In case of s390x architecture, check whether DASD is used.
====> * load_device_driver_deprecation_data
        Loads deprecation data for drivers and devices (PCI & CPU)
====> * scan_files_for_target_userspace
        Scan the source system and identify files that will be copied into the target userspace when it is created.
====> * scanmemory
        Scan Memory of the machine.
====> * pci_devices_scanner
        Provides data about existing PCI Devices.
====> * scan_grub_config
        Scan grub configuration files for errors.
====> * scan_sap_hana
        Gathers information related to SAP HANA instances on the system.
====> * scan_kernel_cmdline
        Scan the kernel command line of the booted system.
====> * scan_source_files
        Scan files (explicitly specified) of the source system.
====> * read_openssh_config
        Collect information about the OpenSSH configuration.
====> * scan_pkg_manager
        Provides data about package manager (yum/dnf)
====> * migrate_rpm_db
        Register a workaround to migrate RPM DB during the upgrade.
====> * scanzfcp
        In case of s390x architecture, check whether ZFCP is used.
====> * udevadm_info
        Produces data exported by the "udevadm info" command.
====> * register_ruby_irb_adjustment
        Register a workaround to allow rubygem-irb's symlink -> directory conversion.
====> * scan_subscription_manager_info
        Scans the current system for subscription manager information
====> * persistentnetnames
        Get network interface information for physical ethernet interfaces of the original system.
====> * remove_obsolete_gpg_keys
        Remove obsoleted RPM GPG keys.
====> * selinuxcontentscanner
        Scan the system for any SELinux customizations
====> * distribution_signed_rpm_scanner
        Provide data about distribution signed & third-party RPM packages.
====> * trusted_gpg_keys_scanner
        Scan for trusted GPG keys.
====> * ipa_scanner
        Scan system for ipa-client and ipa-server status
====> * detect_kernel_drivers
        Matches all currently loaded kernel drivers against known deprecated and removed drivers.
====> * checkrhui
        Check if system is using RHUI infrastructure (on public cloud) and send messages to
====> * get_installed_desktops
        Actor checks if kde or gnome desktop environments
====> * biosdevname
        Enable biosdevname on the target RHEL system if all interfaces on the source RHEL
====> * repositories_blacklist
        Exclude target repositories provided by Red Hat without support.
====> * scancpu
        Scan CPUs of the machine.
====> * scan_dynamic_linker_configuration
        Scan the dynamic linker configuration and find modifications.
====> * scan_fips
        Determine whether the source system has FIPS enabled.
====> * persistentnetnamesdisable
        Disable systemd-udevd persistent network naming on machine with single eth0 NIC
====> * rpm_transaction_config_tasks_collector
        Provides additional RPM transaction tasks from /etc/leapp/transaction.
====> * pes_events_scanner
        Provides data about package events from Package Evolution Service.
====> * scan_source_kernel
        Scan the source system kernel.
====> * used_repository_scanner
        Scan used enabled repositories
====> * scan_mysql
        Actor checking for presence of MySQL installation.
====> * setuptargetrepos
        Produces list of repositories that should be available to be used during IPU process.
==> Processing phase `Checks`
====> * postgresql_check
        Actor checking for presence of PostgreSQL installation.
====> * efi_check_boot
        Adjust EFI boot entry for first reboot
====> * check_root_symlinks
        Check if the symlinks /bin and /lib are relative, not absolute.
====> * check_grubenv_to_file
        Check whether grubenv is a symlink on Azure hybrid images using BIOS.
====> * detect_grub_config_error
        Check grub configuration for various errors.
====> * check_persistent_mounts
        Check if mounts required to be persistent are mounted in persistent fashion.
====> * check_se_linux
        Check SELinux status and produce decision messages for further action.
====> * check_skipped_repositories
        Produces a report if any repositories enabled on the system are going to be skipped.
====> * check_systemd_broken_symlinks
        Check whether some systemd symlinks are broken
====> * check_sap_hana
        If SAP HANA has been detected, several checks are performed to ensure a successful upgrade.
====> * distribution_signed_rpm_check
        Check if there are any packages that are not signed by distribution GPG keys.
====> * check_target_iso
        Check that the provided target ISO is a valid ISO image and is located on a persistent partition.
====> * check_grub_core
        Check whether we are on legacy (BIOS) system and instruct Leapp to upgrade GRUB core
====> * check_target_version
        Check that the target system version is supported by the upgrade process.
====> * check_ipa_server
        Check for ipa-server and inhibit upgrade
====> * check_system_arch
        Check if system is running at a supported architecture. If no, inhibit the upgrade process.
====> * check_yum_plugins_enabled
        Checks that the required yum plugins are enabled.
====> * bacula_check
        Actor checking for presence of Bacula installation.
====> * checktargetrepos
        Check whether target yum repositories are specified.
====> * sssd_check
        Check SSSD configuration for changes in RHEL10 and report them in model.
====> * unsupported_upgrade_check
        Checks environment variables and produces a warning report if the upgrade is unsupported.
====> * cephvolumescan
        Retrieves the list of encrypted Ceph OSD
====> * check_boot_avail_space
        Check if at least 100Mib of available space on /boot. If not, inhibit the upgrade process.
====> * check_default_initramfs
        Checks whether the default initramfs uses problematic dracut modules.
====> * check_cifs
        Check if CIFS filesystem is in use. If yes, inhibit the upgrade process.
====> * check_consumed_assets
        Check whether Leapp is using correct data assets.
====> * check_custom_modifications_actor
        Checks CustomModifications messages and produces a report about files in leapp directories that have been
====> * check_installed_kernels
        Inhibit IPU (in-place upgrade) when installed kernels conflict with a safe upgrade.
====> * check_detected_devices_and_drivers
        Checks whether or not detected devices and drivers are usable on the target system.
====> * check_pam_user_db
        Create report with the location of pam_userdb databases
====> * check_dynamic_linker_configuration
        Check for customization of dynamic linker configuration.
====> * mysql_check
        Actor checking for output produced by scanmysql actor.
====> * check_etc_releasever
        Check releasever info and provide a guidance based on the facts
====> * check_old_xfs
        Check mounted XFS file systems.
====> * check_fips
        Inhibit upgrade if FIPS is detected as enabled.
====> * network_deprecations
        Ensures that network configuration doesn't rely on unsupported settings
====> * check_fstab_mount_order
        Checks order of entries in /etc/fstab based on their mount point and inhibits upgrade if overshadowing is detected.
====> * crypto_policies_check
        This actor consumes previously gathered information about crypto policies on the source
====> * inhibit_cgroupsv1
        Inhibit upgrade if cgroups-v1 are enabled
====> * check_insights_auto_register
        Checks if system can be automatically registered into Red Hat Insights
====> * libdb_check
        Actor checking for presence of libdb(Berkeley DB) installation.
====> * check_rhsmsku
        Ensure the system is subscribed to the subscription manager
====> * openssh_permit_root_login
        OpenSSH no longer allows root logins with password.
====> * mariadb_check
        Actor checking for presence of MariaDB installation.
====> * check_luks
        Check if any encrypted partitions are in use and whether they are supported for the upgrade.
====> * open_ssl_engines_check
        The OpenSSL in RHEL 10 has deprecated engines in favor of providers.
====> * checkmemory
        The actor check the size of RAM against RHEL8 minimal hardware requirements
====> * check_rhsmsca
        Ensure that a registered system is in SCA (Simple Content Access)
====> * check_microarchitecture
        Inhibit if RHEL9 microarchitecture requirements are not satisfied
====> * check_mount_options
        Check for mount options preventing the upgrade.
====> * check_nfs
        Check if NFS filesystem is in use. If yes, inhibit the upgrade process.
====> * check_openssl_conf
        Check whether the openssl configuration and openssl-IBMCA.
====> * check_os_release
        Check if the current RHEL minor version is supported. If not, inhibit the upgrade process.
====> * check_rpm_transaction_events
        Filter RPM transaction events based on installed RPM packages
====> * check_skip_phase
        Skip all the subsequent phases until the report phase.
==> Processing phase `Reports`
====> * verify_check_results
        Check all dialogs and notify that user needs to make some choices.
====> * verify_check_results
        Check all generated results messages and notify user about them.

Debug output written to /var/log/leapp/leapp-preupgrade.log

============================================================
                      REPORT OVERVIEW                       
============================================================

Upgrade has been inhibited due to the following problems:
    1. Use of CIFS detected. Upgrade can't proceed
    2. Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.
    3. Legacy network configuration found
    4. Use of NFS detected. Upgrade can't proceed

HIGH and MEDIUM severity reports:
    1. GRUB2 core will be automatically updated during the upgrade
    2. Upgrade is unsupported
    3. Leapp detected a processor which is no longer maintained in RHEL 10.
    4. Berkeley DB (libdb) has been detected on your system

Reports summary:
    Errors:                      0
    Inhibitors:                  4
    HIGH severity reports:       3
    MEDIUM severity reports:     1
    LOW severity reports:        1
    INFO severity reports:       2

Before continuing, review the full report below for details about discovered problems and possible remediation instructions:
    A report has been generated at /var/log/leapp/leapp-report.txt
    A report has been generated at /var/log/leapp/leapp-report.json

============================================================
                   END OF REPORT OVERVIEW                   
============================================================

Answerfile has been generated at /var/log/leapp/answerfile
Job ended at 2026-01-12T13:58:44Z
", "encoding": "base64", "source": "/var/log/ripu/ripu.log"} RUNNING HANDLER [infra.leapp.common : Decode ripu.log file] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:26 ok: [managed-node01] => {"ansible_facts": {"ripu_log_file": ["RIPU preupgrade analysis", "Job started at 2026-01-12T13:57:31Z", "", "============================================================", " UNSUPPORTED UPGRADE ", "============================================================", "", "Variable LEAPP_UNSUPPORTED has been detected. Proceeding at your own risk.", "Development variables have been detected:", "- LEAPP_DEVEL_RPMS_ALL_SIGNED=1", "", "============================================================", " UNSUPPORTED UPGRADE ", "============================================================", "", "==> Processing phase `configuration_phase`", "====> * ipu_workflow_config", " IPU workflow config actor", "==> Processing phase `FactsCollection`", "====> * open_ssl_config_scanner", " Read an OpenSSL configuration file for further analysis.", "====> * scan_pam_user_db", " Scan the PAM service folder for the location of pam_userdb databases", "====> * storage_scanner", " Provides data about storage settings.", "====> * sssd_facts", " Check SSSD configuration for changes in RHEL10 and report them in model.", "====> * scan_source_boot_entry", " Scan the default boot entry of the source system.", "====> * transaction_workarounds", " Provides additional RPM transaction tasks based on bundled RPM packages.", "====> * repository_mapping", " Produces message containing repository mapping based on provided file.", "====> * ifcfg_scanner", " Scan ifcfg files with legacy network configuration", "====> * root_scanner", " Scan the system root directory and produce a message containing", "====> * scanclienablerepo", " Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.", "====> * system_facts", " Provides data about many facts from system.", "====> * get_enabled_modules", " Provides data about which module streams are enabled on the source system.", "====> * satellite_upgrade_services", " Reconfigure Satellite services", "====> * scan_target_os_image", " Scans the provided target OS ISO image to use as a content source for the IPU, if any.", "====> * luks_scanner", " Provides data about active LUKS devices.", "====> * xfs_info_scanner", " This actor scans all mounted mountpoints for XFS information.", "====> * rpm_scanner", " Provides data about installed RPM Packages.", "====> * scan_systemd_source", " Provides info about systemd on the source system", "====> * scan_default_initramfs", " Scan details of the default boot entry's initramfs image.", "====> * scancryptopolicies", " Scan information about system wide set crypto policies including:", "====> * copy_dnf_conf_into_target_userspace", " Copy dnf.conf into target userspace", "====> * scan_grub_device_name", " Find the name of the block devices where GRUB is located", "====> * scan_custom_modifications_actor", " Collects information about files in leapp directories that have been modified or newly added.", "====> * scan_hybrid_image_azure", " Check if the system is using Azure hybrid image.", "====> * scan_custom_repofile", " Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.", "====> * network_manager_read_config", " Provides data about NetworkManager configuration.", "====> * scandasd", " In case of s390x architecture, check whether DASD is used.", "====> * load_device_driver_deprecation_data", " Loads deprecation data for drivers and devices (PCI & CPU)", "====> * scan_files_for_target_userspace", " Scan the source system and identify files that will be copied into the target userspace when it is created.", "====> * scanmemory", " Scan Memory of the machine.", "====> * pci_devices_scanner", " Provides data about existing PCI Devices.", "====> * scan_grub_config", " Scan grub configuration files for errors.", "====> * scan_sap_hana", " Gathers information related to SAP HANA instances on the system.", "====> * scan_kernel_cmdline", " Scan the kernel command line of the booted system.", "====> * scan_source_files", " Scan files (explicitly specified) of the source system.", "====> * read_openssh_config", " Collect information about the OpenSSH configuration.", "====> * scan_pkg_manager", " Provides data about package manager (yum/dnf)", "====> * migrate_rpm_db", " Register a workaround to migrate RPM DB during the upgrade.", "====> * scanzfcp", " In case of s390x architecture, check whether ZFCP is used.", "====> * udevadm_info", " Produces data exported by the \"udevadm info\" command.", "====> * register_ruby_irb_adjustment", " Register a workaround to allow rubygem-irb's symlink -> directory conversion.", "====> * scan_subscription_manager_info", " Scans the current system for subscription manager information", "====> * persistentnetnames", " Get network interface information for physical ethernet interfaces of the original system.", "====> * remove_obsolete_gpg_keys", " Remove obsoleted RPM GPG keys.", "====> * selinuxcontentscanner", " Scan the system for any SELinux customizations", "====> * distribution_signed_rpm_scanner", " Provide data about distribution signed & third-party RPM packages.", "====> * trusted_gpg_keys_scanner", " Scan for trusted GPG keys.", "====> * ipa_scanner", " Scan system for ipa-client and ipa-server status", "====> * detect_kernel_drivers", " Matches all currently loaded kernel drivers against known deprecated and removed drivers.", "====> * checkrhui", " Check if system is using RHUI infrastructure (on public cloud) and send messages to", "====> * get_installed_desktops", " Actor checks if kde or gnome desktop environments", "====> * biosdevname", " Enable biosdevname on the target RHEL system if all interfaces on the source RHEL", "====> * repositories_blacklist", " Exclude target repositories provided by Red Hat without support.", "====> * scancpu", " Scan CPUs of the machine.", "====> * scan_dynamic_linker_configuration", " Scan the dynamic linker configuration and find modifications.", "====> * scan_fips", " Determine whether the source system has FIPS enabled.", "====> * persistentnetnamesdisable", " Disable systemd-udevd persistent network naming on machine with single eth0 NIC", "====> * rpm_transaction_config_tasks_collector", " Provides additional RPM transaction tasks from /etc/leapp/transaction.", "====> * pes_events_scanner", " Provides data about package events from Package Evolution Service.", "====> * scan_source_kernel", " Scan the source system kernel.", "====> * used_repository_scanner", " Scan used enabled repositories", "====> * scan_mysql", " Actor checking for presence of MySQL installation.", "====> * setuptargetrepos", " Produces list of repositories that should be available to be used during IPU process.", "==> Processing phase `Checks`", "====> * postgresql_check", " Actor checking for presence of PostgreSQL installation.", "====> * efi_check_boot", " Adjust EFI boot entry for first reboot", "====> * check_root_symlinks", " Check if the symlinks /bin and /lib are relative, not absolute.", "====> * check_grubenv_to_file", " Check whether grubenv is a symlink on Azure hybrid images using BIOS.", "====> * detect_grub_config_error", " Check grub configuration for various errors.", "====> * check_persistent_mounts", " Check if mounts required to be persistent are mounted in persistent fashion.", "====> * check_se_linux", " Check SELinux status and produce decision messages for further action.", "====> * check_skipped_repositories", " Produces a report if any repositories enabled on the system are going to be skipped.", "====> * check_systemd_broken_symlinks", " Check whether some systemd symlinks are broken", "====> * check_sap_hana", " If SAP HANA has been detected, several checks are performed to ensure a successful upgrade.", "====> * distribution_signed_rpm_check", " Check if there are any packages that are not signed by distribution GPG keys.", "====> * check_target_iso", " Check that the provided target ISO is a valid ISO image and is located on a persistent partition.", "====> * check_grub_core", " Check whether we are on legacy (BIOS) system and instruct Leapp to upgrade GRUB core", "====> * check_target_version", " Check that the target system version is supported by the upgrade process.", "====> * check_ipa_server", " Check for ipa-server and inhibit upgrade", "====> * check_system_arch", " Check if system is running at a supported architecture. If no, inhibit the upgrade process.", "====> * check_yum_plugins_enabled", " Checks that the required yum plugins are enabled.", "====> * bacula_check", " Actor checking for presence of Bacula installation.", "====> * checktargetrepos", " Check whether target yum repositories are specified.", "====> * sssd_check", " Check SSSD configuration for changes in RHEL10 and report them in model.", "====> * unsupported_upgrade_check", " Checks environment variables and produces a warning report if the upgrade is unsupported.", "====> * cephvolumescan", " Retrieves the list of encrypted Ceph OSD", "====> * check_boot_avail_space", " Check if at least 100Mib of available space on /boot. If not, inhibit the upgrade process.", "====> * check_default_initramfs", " Checks whether the default initramfs uses problematic dracut modules.", "====> * check_cifs", " Check if CIFS filesystem is in use. If yes, inhibit the upgrade process.", "====> * check_consumed_assets", " Check whether Leapp is using correct data assets.", "====> * check_custom_modifications_actor", " Checks CustomModifications messages and produces a report about files in leapp directories that have been", "====> * check_installed_kernels", " Inhibit IPU (in-place upgrade) when installed kernels conflict with a safe upgrade.", "====> * check_detected_devices_and_drivers", " Checks whether or not detected devices and drivers are usable on the target system.", "====> * check_pam_user_db", " Create report with the location of pam_userdb databases", "====> * check_dynamic_linker_configuration", " Check for customization of dynamic linker configuration.", "====> * mysql_check", " Actor checking for output produced by scanmysql actor.", "====> * check_etc_releasever", " Check releasever info and provide a guidance based on the facts", "====> * check_old_xfs", " Check mounted XFS file systems.", "====> * check_fips", " Inhibit upgrade if FIPS is detected as enabled.", "====> * network_deprecations", " Ensures that network configuration doesn't rely on unsupported settings", "====> * check_fstab_mount_order", " Checks order of entries in /etc/fstab based on their mount point and inhibits upgrade if overshadowing is detected.", "====> * crypto_policies_check", " This actor consumes previously gathered information about crypto policies on the source", "====> * inhibit_cgroupsv1", " Inhibit upgrade if cgroups-v1 are enabled", "====> * check_insights_auto_register", " Checks if system can be automatically registered into Red Hat Insights", "====> * libdb_check", " Actor checking for presence of libdb(Berkeley DB) installation.", "====> * check_rhsmsku", " Ensure the system is subscribed to the subscription manager", "====> * openssh_permit_root_login", " OpenSSH no longer allows root logins with password.", "====> * mariadb_check", " Actor checking for presence of MariaDB installation.", "====> * check_luks", " Check if any encrypted partitions are in use and whether they are supported for the upgrade.", "====> * open_ssl_engines_check", " The OpenSSL in RHEL 10 has deprecated engines in favor of providers.", "====> * checkmemory", " The actor check the size of RAM against RHEL8 minimal hardware requirements", "====> * check_rhsmsca", " Ensure that a registered system is in SCA (Simple Content Access)", "====> * check_microarchitecture", " Inhibit if RHEL9 microarchitecture requirements are not satisfied", "====> * check_mount_options", " Check for mount options preventing the upgrade.", "====> * check_nfs", " Check if NFS filesystem is in use. If yes, inhibit the upgrade process.", "====> * check_openssl_conf", " Check whether the openssl configuration and openssl-IBMCA.", "====> * check_os_release", " Check if the current RHEL minor version is supported. If not, inhibit the upgrade process.", "====> * check_rpm_transaction_events", " Filter RPM transaction events based on installed RPM packages", "====> * check_skip_phase", " Skip all the subsequent phases until the report phase.", "==> Processing phase `Reports`", "====> * verify_check_results", " Check all dialogs and notify that user needs to make some choices.", "====> * verify_check_results", " Check all generated results messages and notify user about them.", "", "Debug output written to /var/log/leapp/leapp-preupgrade.log", "", "============================================================", " REPORT OVERVIEW ", "============================================================", "", "Upgrade has been inhibited due to the following problems:", " 1. Use of CIFS detected. Upgrade can't proceed", " 2. Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.", " 3. Legacy network configuration found", " 4. Use of NFS detected. Upgrade can't proceed", "", "HIGH and MEDIUM severity reports:", " 1. GRUB2 core will be automatically updated during the upgrade", " 2. Upgrade is unsupported", " 3. Leapp detected a processor which is no longer maintained in RHEL 10.", " 4. Berkeley DB (libdb) has been detected on your system", "", "Reports summary:", " Errors: 0", " Inhibitors: 4", " HIGH severity reports: 3", " MEDIUM severity reports: 1", " LOW severity reports: 1", " INFO severity reports: 2", "", "Before continuing, review the full report below for details about discovered problems and possible remediation instructions:", " A report has been generated at /var/log/leapp/leapp-report.txt", " A report has been generated at /var/log/leapp/leapp-report.json", "", "============================================================", " END OF REPORT OVERVIEW ", "============================================================", "", "Answerfile has been generated at /var/log/leapp/answerfile", "Job ended at 2026-01-12T13:58:44Z", ""]}, "changed": false} RUNNING HANDLER [infra.leapp.common : Rename log file] ************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:32 changed: [managed-node01] => {"changed": true, "cmd": "export PATH=$PATH\nmv /var/log/ripu/ripu.log /var/log/ripu/ripu.log-20260112T085724\n", "delta": "0:00:00.004495", "end": "2026-01-12 08:58:45.723670", "msg": "", "rc": 0, "start": "2026-01-12 08:58:45.719175", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} RUNNING HANDLER [infra.leapp.common : Check for log file] ********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:3 ok: [managed-node01] => {"changed": false, "stat": {"exists": false}} RUNNING HANDLER [infra.leapp.common : Add end time to log file] **************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:9 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Slurp ripu.log file] ********************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:19 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Decode ripu.log file] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:26 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Rename log file] ************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:32 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.analysis : Display inhibitors] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/handlers/main.yml:32 ok: [managed-node01] => { "results_inhibitors.stdout_lines": [ "Risk Factor: high (inhibitor)", "Title: Use of CIFS detected. Upgrade can't proceed", "Summary: CIFS is currently not supported by the inplace upgrade.", "Related links:", " - Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\": https://access.redhat.com/solutions/6964304", "Remediation: [hint] Comment out CIFS entries to proceed with the upgrade.", "Key: d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.", "Summary: Support for the following RHEL 9 device drivers has been removed in RHEL 10:", " - qla3xxx", " - vmw_pvrdma", "", "Related links:", " - Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\": https://access.redhat.com/solutions/6971716", " - Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\": https://access.redhat.com/solutions/5436131", "Key: 48e04852631245aa4afee9adcdc7c2375b8cffb8", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Legacy network configuration found", "Summary: Network configuration files in legacy \"ifcfg\" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:", " - /etc/sysconfig/network-scripts/ifcfg-eth0", "Related links:", " - How to migrate the connection from ifcfg to NetworkManager keyfile plugin?: https://access.redhat.com/solutions/7083803", " - nmcli(1) manual, describes \"connection migrate\" sub-command.: https://networkmanager.dev/docs/api/latest/nmcli.html", " - nm-settings-ifcfg-rh(5), description of the \"ifcfg\" format: https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html", " - nm-settings-keyfile(5), description of the \"keyfile\" format: https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html", "Remediation: [hint] Convert the configuration into NetworkManager native \"keyfile\" format.", "[command] nmcli connection migrate /etc/sysconfig/network-scripts/ifcfg-eth0", "Key: 7de70b43c3c9d20075e30894ac24a4c4e2d70837", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Use of NFS detected. Upgrade can't proceed", "Summary: NFS is currently not supported by the inplace upgrade.", "We have found NFS usage at the following locations:", "- NFS shares found in /etc/fstab:", " - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat", " - nest.test.redhat.com:/mnt/qa /mnt/qa", " - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive", " - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist", " - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew", " - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch", "", "Related links:", " - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006", "Remediation: [hint] Disable NFS temporarily for the upgrade if possible.", "Key: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "----------------------------------------" ] } RUNNING HANDLER [infra.leapp.analysis : Display errors] ************************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/handlers/main.yml:40 skipping: [managed-node01] => {} RUNNING HANDLER [infra.leapp.analysis : Preupgrade analysis report is done] **** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/handlers/main.yml:48 ok: [managed-node01] => { "msg": "The preupgrade analysis report generation is now complete. WARNING: Inhibitors found. Review the tasks above or the result file at /var/log/leapp/leapp-report.txt." } TASK [common_upgrade_tasks | Show all inhibitors collected by analysis] ******** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:47 ok: [managed-node01] => { "leapp_inhibitors | default([])": [ { "actor": "check_cifs", "audience": "sysadmin", "detail": { "external": [ { "title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304" } ], "related_resources": [ { "scheme": "file", "title": "/etc/fstab" } ], "remediations": [ { "context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint" } ] }, "groups": [ "filesystem", "network", "inhibitor" ], "hostname": "managed-node01", "id": "7d1a4b2859cfa9a9e47e0986278a60695a41893cd51aab1ec41188d0316b902f", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2026-01-12T13:58:05.022466Z", "title": "Use of CIFS detected. Upgrade can't proceed" }, { "actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": { "external": [ { "title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/6971716" }, { "title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131" } ] }, "groups": [ "kernel", "drivers", "inhibitor" ], "hostname": "managed-node01", "id": "209ca2ad519594527e5c95cd2a1c08c66833738d593d41ff0aa73d82ef3c72db", "key": "48e04852631245aa4afee9adcdc7c2375b8cffb8", "severity": "high", "summary": "Support for the following RHEL 9 device drivers has been removed in RHEL 10:\n - qla3xxx\n - vmw_pvrdma\n", "timeStamp": "2026-01-12T13:58:05.219121Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed." }, { "actor": "network_deprecations", "audience": "sysadmin", "detail": { "external": [ { "title": "How to migrate the connection from ifcfg to NetworkManager keyfile plugin?", "url": "https://access.redhat.com/solutions/7083803" }, { "title": "nmcli(1) manual, describes \"connection migrate\" sub-command.", "url": "https://networkmanager.dev/docs/api/latest/nmcli.html" }, { "title": "nm-settings-ifcfg-rh(5), description of the \"ifcfg\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html" }, { "title": "nm-settings-keyfile(5), description of the \"keyfile\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html" } ], "related_resources": [ { "scheme": "package", "title": "NetworkManager" }, { "scheme": "file", "title": "/etc/sysconfig/network-scripts/ifcfg-eth0" } ], "remediations": [ { "context": "Convert the configuration into NetworkManager native \"keyfile\" format.", "type": "hint" }, { "context": [ "nmcli", "connection", "migrate", "/etc/sysconfig/network-scripts/ifcfg-eth0" ], "type": "command" } ] }, "groups": [ "network", "services", "inhibitor" ], "hostname": "managed-node01", "id": "f475031f70e687cdddd38e4e97b94cbcc771b878102484e33af86b6a12ae64f0", "key": "7de70b43c3c9d20075e30894ac24a4c4e2d70837", "severity": "high", "summary": "Network configuration files in legacy \"ifcfg\" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:\n - /etc/sysconfig/network-scripts/ifcfg-eth0", "timeStamp": "2026-01-12T13:58:05.501987Z", "title": "Legacy network configuration found" }, { "actor": "check_nfs", "audience": "sysadmin", "detail": { "external": [ { "title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006" } ], "related_resources": [ { "scheme": "file", "title": "/etc/fstab" } ], "remediations": [ { "context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint" } ] }, "groups": [ "filesystem", "network", "inhibitor" ], "hostname": "managed-node01", "id": "830bde6c37fe89aa3306731ef54dcc83b5ee7564cfeeb1af8e4e7d82f037b5a8", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n", "timeStamp": "2026-01-12T13:58:06.297471Z", "title": "Use of NFS detected. Upgrade can't proceed" } ] } TASK [common_upgrade_tasks | Extract inhibitor titles] ************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:51 ok: [managed-node01] => {"ansible_facts": {"inhibitor_titles": ["Use of CIFS detected. Upgrade can't proceed", "Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.", "Legacy network configuration found", "Use of NFS detected. Upgrade can't proceed"]}, "changed": false} TASK [common_upgrade_tasks | Initialize remediation_todo] ********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:55 ok: [managed-node01] => {"ansible_facts": {"leapp_remediation_todo": []}, "changed": false} TASK [common_upgrade_tasks | Map inhibitors to remediation_todo] *************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:59 ok: [managed-node01] => (item=Use of CIFS detected. Upgrade can't proceed) => {"ansible_facts": {"leapp_remediation_todo": ["leapp_cifs_detected"]}, "ansible_loop_var": "inhibitor_title", "changed": false, "inhibitor_title": "Use of CIFS detected. Upgrade can't proceed"} ok: [managed-node01] => (item=Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.) => {"ansible_facts": {"leapp_remediation_todo": ["leapp_cifs_detected", "leapp_loaded_removed_kernel_drivers"]}, "ansible_loop_var": "inhibitor_title", "changed": false, "inhibitor_title": "Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed."} ok: [managed-node01] => (item=Legacy network configuration found) => {"ansible_facts": {"leapp_remediation_todo": ["leapp_cifs_detected", "leapp_loaded_removed_kernel_drivers", "leapp_legacy_network_configuration"]}, "ansible_loop_var": "inhibitor_title", "changed": false, "inhibitor_title": "Legacy network configuration found"} ok: [managed-node01] => (item=Use of NFS detected. Upgrade can't proceed) => {"ansible_facts": {"leapp_remediation_todo": ["leapp_cifs_detected", "leapp_loaded_removed_kernel_drivers", "leapp_legacy_network_configuration", "leapp_nfs_detected"]}, "ansible_loop_var": "inhibitor_title", "changed": false, "inhibitor_title": "Use of NFS detected. Upgrade can't proceed"} TASK [common_upgrade_tasks | Debug remediation_todo] *************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:69 ok: [managed-node01] => { "leapp_remediation_todo": [ "leapp_cifs_detected", "leapp_loaded_removed_kernel_drivers", "leapp_legacy_network_configuration", "leapp_nfs_detected" ] } TASK [common_upgrade_tasks | Run remediation] ********************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:73 TASK [infra.leapp.remediate : Check that the leapp-report.json exists] ********* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/main.yml:7 ok: [managed-node01] => {"changed": false, "stat": {"atime": 1768226323.1787105, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 32, "charset": "us-ascii", "checksum": "208c14ba34c16d7e5834019ffb8e0446e8d7eb51", "ctime": 1768226286.5977838, "dev": 51716, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 687866007, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "application/json", "mode": "0644", "mtime": 1768226286.5977838, "nlink": 1, "path": "/var/log/leapp/leapp-report.json", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 13161, "uid": 0, "version": "2651739764", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} TASK [infra.leapp.remediate : Set leapp_report_missing to true if the leapp-report.json does not exist] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/main.yml:12 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.remediate : Read leapp report] ******************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/main.yml:17 ok: [managed-node01] => {"changed": false, "content": "{
  "entries": [
    {
      "audience": "sysadmin",
      "detail": {
        "remediations": [
          {
            "context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).",
            "type": "hint"
          }
        ]
      },
      "groups": [
        "repository",
        "failure"
      ],
      "key": "1b9132cb2362ae7830e48eee7811be9527747de8",
      "severity": "info",
      "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-for-rhel-10-s390x-rpms\n- rhui-codeready-builder-for-rhel-10-x86_64-rhui-rpms\n- codeready-builder-for-rhel-10-ppc64le-rpms\n- codeready-builder-beta-for-rhel-10-s390x-rpms\n- codeready-builder-for-rhel-10-x86_64-rpms\n- codeready-builder-for-rhel-10-ppc64le-eus-rpms\n- codeready-builder-for-rhel-10-aarch64-rpms\n- rhui-codeready-builder-for-rhel-10-aarch64-rhui-rpms\n- crb\n- codeready-builder-for-rhel-10-s390x-eus-rpms\n- codeready-builder-for-rhel-10-x86_64-eus-rpms\n- codeready-builder-beta-for-rhel-10-aarch64-rpms\n- codeready-builder-for-rhel-10-rhui-rpms\n- codeready-builder-beta-for-rhel-10-x86_64-rpms\n- codeready-builder-for-rhel-10-aarch64-eus-rpms\n- codeready-builder-beta-for-rhel-10-ppc64le-rpms",
      "title": "Excluded target system repositories",
      "timeStamp": "2026-01-12T13:58:02.104249Z",
      "hostname": "managed-node01",
      "actor": "repositories_blacklist",
      "id": "ec3586a9593df495fe5ed948919727fba1ca1707034d3daaff201c94ac9b7524"
    },
    {
      "audience": "sysadmin",
      "groups": [
        "selinux",
        "security"
      ],
      "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72",
      "severity": "info",
      "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.",
      "title": "SElinux relabeling will be scheduled",
      "timeStamp": "2026-01-12T13:58:04.158101Z",
      "hostname": "managed-node01",
      "actor": "check_se_linux",
      "id": "47949c93f5c86d361e1e10aaacb80c7741a43236819a51e45781dcd1043a3236"
    },
    {
      "audience": "sysadmin",
      "detail": {
        "remediations": [
          {
            "context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.",
            "type": "hint"
          }
        ]
      },
      "groups": [
        "selinux",
        "security"
      ],
      "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f",
      "severity": "low",
      "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.",
      "title": "SElinux will be set to permissive mode",
      "timeStamp": "2026-01-12T13:58:04.162042Z",
      "hostname": "managed-node01",
      "actor": "check_se_linux",
      "id": "4cd9064b70ffafa8020e1442a64d9a04df136f4d545176eec0432466ce5c1e70"
    },
    {
      "audience": "sysadmin",
      "groups": [
        "boot"
      ],
      "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3",
      "severity": "high",
      "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.",
      "title": "GRUB2 core will be automatically updated during the upgrade",
      "timeStamp": "2026-01-12T13:58:04.398323Z",
      "hostname": "managed-node01",
      "actor": "check_grub_core",
      "id": "81fa8268605976dcca65bd169419db8fe87cb3148b53cb9d77bda2f10296f14b"
    },
    {
      "audience": "sysadmin",
      "groups": [
        "upgrade process",
        "sanity"
      ],
      "key": "9e5088e3c1f371e020ec777c3d86578f4be143cf",
      "severity": "high",
      "summary": "Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.\n",
      "title": "Upgrade is unsupported",
      "timeStamp": "2026-01-12T13:58:04.868626Z",
      "hostname": "managed-node01",
      "actor": "unsupported_upgrade_check",
      "id": "b657ccde7581ec3383f986ec6c3c32bc1d1086d22e7d4f39740bef33b01d3af3"
    },
    {
      "audience": "sysadmin",
      "detail": {
        "external": [
          {
            "title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"",
            "url": "https://access.redhat.com/solutions/6964304"
          }
        ],
        "related_resources": [
          {
            "scheme": "file",
            "title": "/etc/fstab"
          }
        ],
        "remediations": [
          {
            "context": "Comment out CIFS entries to proceed with the upgrade.",
            "type": "hint"
          }
        ]
      },
      "groups": [
        "filesystem",
        "network",
        "inhibitor"
      ],
      "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a",
      "severity": "high",
      "summary": "CIFS is currently not supported by the inplace upgrade.",
      "title": "Use of CIFS detected. Upgrade can't proceed",
      "timeStamp": "2026-01-12T13:58:05.022466Z",
      "hostname": "managed-node01",
      "actor": "check_cifs",
      "id": "7d1a4b2859cfa9a9e47e0986278a60695a41893cd51aab1ec41188d0316b902f"
    },
    {
      "audience": "sysadmin",
      "detail": {
        "external": [
          {
            "title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\"",
            "url": "https://access.redhat.com/solutions/6971716"
          },
          {
            "title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\"",
            "url": "https://access.redhat.com/solutions/5436131"
          }
        ]
      },
      "groups": [
        "kernel",
        "drivers",
        "inhibitor"
      ],
      "key": "48e04852631245aa4afee9adcdc7c2375b8cffb8",
      "severity": "high",
      "summary": "Support for the following RHEL 9 device drivers has been removed in RHEL 10:\n     - qla3xxx\n     - vmw_pvrdma\n",
      "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.",
      "timeStamp": "2026-01-12T13:58:05.219121Z",
      "hostname": "managed-node01",
      "actor": "check_detected_devices_and_drivers",
      "id": "209ca2ad519594527e5c95cd2a1c08c66833738d593d41ff0aa73d82ef3c72db"
    },
    {
      "audience": "sysadmin",
      "groups": [
        "kernel",
        "boot"
      ],
      "key": "9dde4bcd8b458bd6803462216785df3a1476c1f8",
      "severity": "high",
      "summary": "The following processors are no longer maintained in RHEL 10:\n     - HASWELL_X\n",
      "title": "Leapp detected a processor which is no longer maintained in RHEL 10.",
      "timeStamp": "2026-01-12T13:58:05.221945Z",
      "hostname": "managed-node01",
      "actor": "check_detected_devices_and_drivers",
      "id": "6eceee9a6ee749acad9a91912df006364dd9975d595a8ef834a9b74dba613529"
    },
    {
      "audience": "sysadmin",
      "detail": {
        "external": [
          {
            "title": "How to migrate the connection from ifcfg to NetworkManager keyfile plugin?",
            "url": "https://access.redhat.com/solutions/7083803"
          },
          {
            "title": "nmcli(1) manual, describes \"connection migrate\" sub-command.",
            "url": "https://networkmanager.dev/docs/api/latest/nmcli.html"
          },
          {
            "title": "nm-settings-ifcfg-rh(5), description of the \"ifcfg\" format",
            "url": "https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html"
          },
          {
            "title": "nm-settings-keyfile(5), description of the \"keyfile\" format",
            "url": "https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html"
          }
        ],
        "related_resources": [
          {
            "scheme": "package",
            "title": "NetworkManager"
          },
          {
            "scheme": "file",
            "title": "/etc/sysconfig/network-scripts/ifcfg-eth0"
          }
        ],
        "remediations": [
          {
            "context": "Convert the configuration into NetworkManager native \"keyfile\" format.",
            "type": "hint"
          },
          {
            "context": [
              "nmcli",
              "connection",
              "migrate",
              "/etc/sysconfig/network-scripts/ifcfg-eth0"
            ],
            "type": "command"
          }
        ]
      },
      "groups": [
        "network",
        "services",
        "inhibitor"
      ],
      "key": "7de70b43c3c9d20075e30894ac24a4c4e2d70837",
      "severity": "high",
      "summary": "Network configuration files in legacy \"ifcfg\" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:\n    - /etc/sysconfig/network-scripts/ifcfg-eth0",
      "title": "Legacy network configuration found",
      "timeStamp": "2026-01-12T13:58:05.501987Z",
      "hostname": "managed-node01",
      "actor": "network_deprecations",
      "id": "f475031f70e687cdddd38e4e97b94cbcc771b878102484e33af86b6a12ae64f0"
    },
    {
      "audience": "sysadmin",
      "detail": {
        "external": [
          {
            "title": "Migrating to a RHEL 10 without libdb",
            "url": "https://access.redhat.com/articles/7099256"
          }
        ],
        "related_resources": [
          {
            "scheme": "package",
            "title": "libdb"
          }
        ],
        "remediations": [
          {
            "context": "Back up your data before proceeding with the data upgrade/migration. For the conversion, the tool db_converter from the libdb-utils rpm could be used. This database format conversion must be performed before the system upgrade. The db_converter is not available in RHEL 10 systems. For more information, see the provided article.",
            "type": "hint"
          }
        ]
      },
      "groups": [
        "services"
      ],
      "key": "fdc8f5b084e95922a4f59485a807a92cae2fc738",
      "severity": "medium",
      "summary": "Libdb was marked as deprecated in RHEL-9 and in RHEL-10 is not included anymore. There are a couple of alternatives in RHEL-10; the applications that depend on libdb will not work. Such applications must implement another type of backend storage. And migrate existing data to the new database format.",
      "title": "Berkeley DB (libdb) has been detected on your system",
      "timeStamp": "2026-01-12T13:58:05.798708Z",
      "hostname": "managed-node01",
      "actor": "libdb_check",
      "id": "9c5e4acaa43d37141c8b127264783908c6bdccbe4290183cf0e8beb2ae6c7a34"
    },
    {
      "audience": "sysadmin",
      "detail": {
        "external": [
          {
            "title": "Why does leapp upgrade fail on detecting NFS during upgrade?",
            "url": "https://access.redhat.com/solutions/6964006"
          }
        ],
        "related_resources": [
          {
            "scheme": "file",
            "title": "/etc/fstab"
          }
        ],
        "remediations": [
          {
            "context": "Disable NFS temporarily for the upgrade if possible.",
            "type": "hint"
          }
        ]
      },
      "groups": [
        "filesystem",
        "network",
        "inhibitor"
      ],
      "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed",
      "severity": "high",
      "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n",
      "title": "Use of NFS detected. Upgrade can't proceed",
      "timeStamp": "2026-01-12T13:58:06.297471Z",
      "hostname": "managed-node01",
      "actor": "check_nfs",
      "id": "830bde6c37fe89aa3306731ef54dcc83b5ee7564cfeeb1af8e4e7d82f037b5a8"
    }
  ],
  "leapp_run_id": "9f3479cc-c0ed-4f3c-8156-f48d16895287"
}
", "encoding": "base64", "source": "/var/log/leapp/leapp-report.json"} TASK [infra.leapp.remediate : Parse leapp report] ****************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/main.yml:23 ok: [managed-node01] => {"ansible_facts": {"leapp_report_data": {"entries": [{"actor": "repositories_blacklist", "audience": "sysadmin", "detail": {"remediations": [{"context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "type": "hint"}]}, "groups": ["repository", "failure"], "hostname": "managed-node01", "id": "ec3586a9593df495fe5ed948919727fba1ca1707034d3daaff201c94ac9b7524", "key": "1b9132cb2362ae7830e48eee7811be9527747de8", "severity": "info", "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-for-rhel-10-s390x-rpms\n- rhui-codeready-builder-for-rhel-10-x86_64-rhui-rpms\n- codeready-builder-for-rhel-10-ppc64le-rpms\n- codeready-builder-beta-for-rhel-10-s390x-rpms\n- codeready-builder-for-rhel-10-x86_64-rpms\n- codeready-builder-for-rhel-10-ppc64le-eus-rpms\n- codeready-builder-for-rhel-10-aarch64-rpms\n- rhui-codeready-builder-for-rhel-10-aarch64-rhui-rpms\n- crb\n- codeready-builder-for-rhel-10-s390x-eus-rpms\n- codeready-builder-for-rhel-10-x86_64-eus-rpms\n- codeready-builder-beta-for-rhel-10-aarch64-rpms\n- codeready-builder-for-rhel-10-rhui-rpms\n- codeready-builder-beta-for-rhel-10-x86_64-rpms\n- codeready-builder-for-rhel-10-aarch64-eus-rpms\n- codeready-builder-beta-for-rhel-10-ppc64le-rpms", "timeStamp": "2026-01-12T13:58:02.104249Z", "title": "Excluded target system repositories"}, {"actor": "check_se_linux", "audience": "sysadmin", "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "47949c93f5c86d361e1e10aaacb80c7741a43236819a51e45781dcd1043a3236", "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", "severity": "info", "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", "timeStamp": "2026-01-12T13:58:04.158101Z", "title": "SElinux relabeling will be scheduled"}, {"actor": "check_se_linux", "audience": "sysadmin", "detail": {"remediations": [{"context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.", "type": "hint"}]}, "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "4cd9064b70ffafa8020e1442a64d9a04df136f4d545176eec0432466ce5c1e70", "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", "severity": "low", "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", "timeStamp": "2026-01-12T13:58:04.162042Z", "title": "SElinux will be set to permissive mode"}, {"actor": "check_grub_core", "audience": "sysadmin", "groups": ["boot"], "hostname": "managed-node01", "id": "81fa8268605976dcca65bd169419db8fe87cb3148b53cb9d77bda2f10296f14b", "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", "severity": "high", "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", "timeStamp": "2026-01-12T13:58:04.398323Z", "title": "GRUB2 core will be automatically updated during the upgrade"}, {"actor": "unsupported_upgrade_check", "audience": "sysadmin", "groups": ["upgrade process", "sanity"], "hostname": "managed-node01", "id": "b657ccde7581ec3383f986ec6c3c32bc1d1086d22e7d4f39740bef33b01d3af3", "key": "9e5088e3c1f371e020ec777c3d86578f4be143cf", "severity": "high", "summary": "Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.\n", "timeStamp": "2026-01-12T13:58:04.868626Z", "title": "Upgrade is unsupported"}, {"actor": "check_cifs", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "7d1a4b2859cfa9a9e47e0986278a60695a41893cd51aab1ec41188d0316b902f", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2026-01-12T13:58:05.022466Z", "title": "Use of CIFS detected. Upgrade can't proceed"}, {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "209ca2ad519594527e5c95cd2a1c08c66833738d593d41ff0aa73d82ef3c72db", "key": "48e04852631245aa4afee9adcdc7c2375b8cffb8", "severity": "high", "summary": "Support for the following RHEL 9 device drivers has been removed in RHEL 10:\n - qla3xxx\n - vmw_pvrdma\n", "timeStamp": "2026-01-12T13:58:05.219121Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed."}, {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "groups": ["kernel", "boot"], "hostname": "managed-node01", "id": "6eceee9a6ee749acad9a91912df006364dd9975d595a8ef834a9b74dba613529", "key": "9dde4bcd8b458bd6803462216785df3a1476c1f8", "severity": "high", "summary": "The following processors are no longer maintained in RHEL 10:\n - HASWELL_X\n", "timeStamp": "2026-01-12T13:58:05.221945Z", "title": "Leapp detected a processor which is no longer maintained in RHEL 10."}, {"actor": "network_deprecations", "audience": "sysadmin", "detail": {"external": [{"title": "How to migrate the connection from ifcfg to NetworkManager keyfile plugin?", "url": "https://access.redhat.com/solutions/7083803"}, {"title": "nmcli(1) manual, describes \"connection migrate\" sub-command.", "url": "https://networkmanager.dev/docs/api/latest/nmcli.html"}, {"title": "nm-settings-ifcfg-rh(5), description of the \"ifcfg\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html"}, {"title": "nm-settings-keyfile(5), description of the \"keyfile\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html"}], "related_resources": [{"scheme": "package", "title": "NetworkManager"}, {"scheme": "file", "title": "/etc/sysconfig/network-scripts/ifcfg-eth0"}], "remediations": [{"context": "Convert the configuration into NetworkManager native \"keyfile\" format.", "type": "hint"}, {"context": ["nmcli", "connection", "migrate", "/etc/sysconfig/network-scripts/ifcfg-eth0"], "type": "command"}]}, "groups": ["network", "services", "inhibitor"], "hostname": "managed-node01", "id": "f475031f70e687cdddd38e4e97b94cbcc771b878102484e33af86b6a12ae64f0", "key": "7de70b43c3c9d20075e30894ac24a4c4e2d70837", "severity": "high", "summary": "Network configuration files in legacy \"ifcfg\" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:\n - /etc/sysconfig/network-scripts/ifcfg-eth0", "timeStamp": "2026-01-12T13:58:05.501987Z", "title": "Legacy network configuration found"}, {"actor": "libdb_check", "audience": "sysadmin", "detail": {"external": [{"title": "Migrating to a RHEL 10 without libdb", "url": "https://access.redhat.com/articles/7099256"}], "related_resources": [{"scheme": "package", "title": "libdb"}], "remediations": [{"context": "Back up your data before proceeding with the data upgrade/migration. For the conversion, the tool db_converter from the libdb-utils rpm could be used. This database format conversion must be performed before the system upgrade. The db_converter is not available in RHEL 10 systems. For more information, see the provided article.", "type": "hint"}]}, "groups": ["services"], "hostname": "managed-node01", "id": "9c5e4acaa43d37141c8b127264783908c6bdccbe4290183cf0e8beb2ae6c7a34", "key": "fdc8f5b084e95922a4f59485a807a92cae2fc738", "severity": "medium", "summary": "Libdb was marked as deprecated in RHEL-9 and in RHEL-10 is not included anymore. There are a couple of alternatives in RHEL-10; the applications that depend on libdb will not work. Such applications must implement another type of backend storage. And migrate existing data to the new database format.", "timeStamp": "2026-01-12T13:58:05.798708Z", "title": "Berkeley DB (libdb) has been detected on your system"}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "830bde6c37fe89aa3306731ef54dcc83b5ee7564cfeeb1af8e4e7d82f037b5a8", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n", "timeStamp": "2026-01-12T13:58:06.297471Z", "title": "Use of NFS detected. Upgrade can't proceed"}], "leapp_run_id": "9f3479cc-c0ed-4f3c-8156-f48d16895287"}}, "changed": false} TASK [infra.leapp.remediate : Check that the 6to7 preupgrade report exists] **** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/main.yml:28 ok: [managed-node01] => {"changed": false, "stat": {"exists": false}} TASK [infra.leapp.remediate : Set leapp_report_missing_6to7 to true if the 6to7 preupgrade report does not exist] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/main.yml:33 ok: [managed-node01] => {"ansible_facts": {"leapp_report_missing_6to7": true}, "changed": false} TASK [infra.leapp.remediate : Read 6to7 preupgrade report] ********************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/main.yml:38 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.remediate : Remediate the system] **************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/main.yml:44 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_cifs_detected.yml for managed-node01 => (item=leapp_cifs_detected) included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_legacy_network_configuration.yml for managed-node01 => (item=leapp_legacy_network_configuration) included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_loaded_removed_kernel_drivers.yml for managed-node01 => (item=leapp_loaded_removed_kernel_drivers) included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_nfs_detected.yml for managed-node01 => (item=leapp_nfs_detected) TASK [infra.leapp.remediate : leapp_cifs_detected | Comment CIFS shares in /etc/fstab] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_cifs_detected.yml:4 changed: [managed-node01] => {"changed": true, "msg": "1 replacements made", "rc": 0} TASK [infra.leapp.remediate : leapp_legacy_network_configuration | Continue when leapp report is missing] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_legacy_network_configuration.yml:2 skipping: [managed-node01] => {} TASK [infra.leapp.remediate : leapp_legacy_network_configuration | End remediation if a matching entry was not found in the leapp report] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_legacy_network_configuration.yml:19 skipping: [managed-node01] => {} TASK [infra.leapp.remediate : leapp_legacy_network_configuration | Show the remediation command] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_legacy_network_configuration.yml:29 ok: [managed-node01] => { "leapp_inhibitor_remediation.context | join(' ')": "nmcli connection migrate /etc/sysconfig/network-scripts/ifcfg-eth0" } TASK [infra.leapp.remediate : leapp_legacy_network_configuration | Migrate the network connection configuration to the keyfile format] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_legacy_network_configuration.yml:33 changed: [managed-node01] => {"changed": true, "cmd": ["nmcli", "connection", "migrate", "/etc/sysconfig/network-scripts/ifcfg-eth0"], "delta": "0:00:00.084461", "end": "2026-01-12 08:58:48.791434", "msg": "", "rc": 0, "start": "2026-01-12 08:58:48.706973", "stderr": "", "stderr_lines": [], "stdout": "Connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) successfully migrated.", "stdout_lines": ["Connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) successfully migrated."]} TASK [infra.leapp.remediate : leapp_legacy_network_configuration | Show the remediation command result] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_legacy_network_configuration.yml:39 ok: [managed-node01] => { "leapp_legacy_network_config_migration.stdout_lines": [ "Connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) successfully migrated." ] } TASK [infra.leapp.remediate : leapp_loaded_removed_kernel_drivers | Continue when leapp report is missing] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_loaded_removed_kernel_drivers.yml:2 skipping: [managed-node01] => {} TASK [infra.leapp.remediate : leapp_loaded_removed_kernel_drivers | End execution of playbook if no entry found in leapp report] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_loaded_removed_kernel_drivers.yml:15 skipping: [managed-node01] => {} TASK [infra.leapp.remediate : leapp_loaded_removed_kernel_drivers | Print unsupported modules] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_loaded_removed_kernel_drivers.yml:23 ok: [managed-node01] => { "unsupported_modules": [ "qla3xxx", "vmw_pvrdma" ] } TASK [leapp_loaded_removed_kernel_drivers | Unload unsupported modules] ******** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_loaded_removed_kernel_drivers.yml:27 TASK [infra.leapp.common : manage_kernel_modules | Load or unload kernel modules] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_kernel_modules.yml:5 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml for managed-node01 => (item=qla3xxx) included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml for managed-node01 => (item=vmw_pvrdma) TASK [infra.leapp.common : manage_one_kernel_module | Load or unload kernel module] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:5 changed: [managed-node01] => {"changed": true, "name": "qla3xxx", "params": "", "state": "absent"} TASK [infra.leapp.common : manage_one_kernel_module | Disable modules-load.d file entry] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:17 changed: [managed-node01] => {"changed": true, "checksum": "ebb6eed6f8182d3266fdab0ba04379eb2a77de52", "dest": "/etc/modules-load.d/90-qla3xxx.conf", "gid": 0, "group": "root", "md5sum": "82df8d0c872c8ce574a404c279160084", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:etc_t:s0", "size": 41, "src": "/root/.ansible/tmp/ansible-tmp-1768226329.6316075-8606-135286283943586/source", "state": "file", "uid": 0} TASK [infra.leapp.common : manage_one_kernel_module | Ensure modules are not loaded at boot] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:25 changed: [managed-node01] => {"changed": true, "checksum": "4a5d1c2b1801756e0b0a5db4f4c7de8cb9f98a9a", "dest": "/etc/modprobe.d/qla3xxx.conf", "gid": 0, "group": "root", "md5sum": "caed615794e2e5c3b5c426aea7c3d551", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:modules_conf_t:s0", "size": 75, "src": "/root/.ansible/tmp/ansible-tmp-1768226330.330819-8625-261850530143411/source", "state": "file", "uid": 0} TASK [infra.leapp.common : manage_one_kernel_module | Debug modprobe.d file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:33 ok: [managed-node01] => {"changed": false, "cmd": ["cat", "/etc/modprobe.d/qla3xxx.conf"], "delta": "0:00:00.003110", "end": "2026-01-12 08:58:51.280602", "msg": "", "rc": 0, "start": "2026-01-12 08:58:51.277492", "stderr": "", "stderr_lines": [], "stdout": "#\n# Ansible managed\n#\n# leapp\n\nblacklist qla3xxx\ninstall qla3xxx /bin/true", "stdout_lines": ["#", "# Ansible managed", "#", "# leapp", "", "blacklist qla3xxx", "install qla3xxx /bin/true"]} TASK [infra.leapp.common : manage_one_kernel_module | Debug modules-load.d file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:37 ok: [managed-node01] => {"changed": false, "cmd": ["cat", "/etc/modules-load.d/90-qla3xxx.conf"], "delta": "0:00:00.003524", "end": "2026-01-12 08:58:51.661597", "msg": "", "rc": 0, "start": "2026-01-12 08:58:51.658073", "stderr": "", "stderr_lines": [], "stdout": "#\n# Ansible managed\n#\n# leapp\n\n# qla3xxx", "stdout_lines": ["#", "# Ansible managed", "#", "# leapp", "", "# qla3xxx"]} TASK [infra.leapp.common : manage_one_kernel_module | Load or unload kernel module] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:5 changed: [managed-node01] => {"changed": true, "name": "vmw_pvrdma", "params": "", "state": "absent"} TASK [infra.leapp.common : manage_one_kernel_module | Disable modules-load.d file entry] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:17 changed: [managed-node01] => {"changed": true, "checksum": "0b7fb96c4cff6acec313b63f2913ca68398ee2da", "dest": "/etc/modules-load.d/90-vmw_pvrdma.conf", "gid": 0, "group": "root", "md5sum": "89c3a445219bd3b9dcb297db1b842182", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:etc_t:s0", "size": 44, "src": "/root/.ansible/tmp/ansible-tmp-1768226332.2302635-8674-145244026899574/source", "state": "file", "uid": 0} TASK [infra.leapp.common : manage_one_kernel_module | Ensure modules are not loaded at boot] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:25 changed: [managed-node01] => {"changed": true, "checksum": "bac8e84bb44579f699c5af3c003fe730183dc0e6", "dest": "/etc/modprobe.d/vmw_pvrdma.conf", "gid": 0, "group": "root", "md5sum": "bde92c2e131e9d8709ef28812e1e0633", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:modules_conf_t:s0", "size": 81, "src": "/root/.ansible/tmp/ansible-tmp-1768226332.9545372-8700-28648235918951/source", "state": "file", "uid": 0} TASK [infra.leapp.common : manage_one_kernel_module | Debug modprobe.d file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:33 ok: [managed-node01] => {"changed": false, "cmd": ["cat", "/etc/modprobe.d/vmw_pvrdma.conf"], "delta": "0:00:00.003633", "end": "2026-01-12 08:58:53.971239", "msg": "", "rc": 0, "start": "2026-01-12 08:58:53.967606", "stderr": "", "stderr_lines": [], "stdout": "#\n# Ansible managed\n#\n# leapp\n\nblacklist vmw_pvrdma\ninstall vmw_pvrdma /bin/true", "stdout_lines": ["#", "# Ansible managed", "#", "# leapp", "", "blacklist vmw_pvrdma", "install vmw_pvrdma /bin/true"]} TASK [infra.leapp.common : manage_one_kernel_module | Debug modules-load.d file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/manage_one_kernel_module.yml:37 ok: [managed-node01] => {"changed": false, "cmd": ["cat", "/etc/modules-load.d/90-vmw_pvrdma.conf"], "delta": "0:00:00.003161", "end": "2026-01-12 08:58:54.398314", "msg": "", "rc": 0, "start": "2026-01-12 08:58:54.395153", "stderr": "", "stderr_lines": [], "stdout": "#\n# Ansible managed\n#\n# leapp\n\n# vmw_pvrdma", "stdout_lines": ["#", "# Ansible managed", "#", "# leapp", "", "# vmw_pvrdma"]} TASK [infra.leapp.remediate : leapp_nfs_detected | Continue when leapp report is missing] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_nfs_detected.yml:2 skipping: [managed-node01] => {} TASK [infra.leapp.remediate : leapp_nfs_detected | End execution of playbook if no entry found in leapp report] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_nfs_detected.yml:15 skipping: [managed-node01] => {} TASK [infra.leapp.remediate : leapp_nfs_detected | Get fstab_entries] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_nfs_detected.yml:25 ok: [managed-node01] => (item=- NFS shares found in /etc/fstab: - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat - nest.test.redhat.com:/mnt/qa /mnt/qa - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch ) => {"ansible_facts": {"fstab_entries": ["ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat", "nest.test.redhat.com:/mnt/qa", "vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive", "nest.test.redhat.com:/mnt/tpsdist", "ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot", "ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch"]}, "ansible_loop_var": "item", "changed": false, "item": "- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n"} TASK [infra.leapp.remediate : leapp_nfs_detected | Get nfs_mounts] ************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_nfs_detected.yml:31 skipping: [managed-node01] => (item=- NFS shares found in /etc/fstab: - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat - nest.test.redhat.com:/mnt/qa /mnt/qa - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch ) => {"ansible_loop_var": "item", "changed": false, "item": "- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => {"changed": false, "msg": "All items skipped"} TASK [infra.leapp.remediate : leapp_nfs_detected | Comment NFS shares in /etc/fstab] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_nfs_detected.yml:37 changed: [managed-node01] => (item=ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat) => {"ansible_loop_var": "item", "changed": true, "cmd": "set -o pipefail\nentry=\"ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat\"\ngrep -qF \"$entry\" /etc/fstab && sed -i \"s|^$entry|# $entry|\" /etc/fstab\n", "delta": "0:00:00.006528", "end": "2026-01-12 08:58:55.035768", "item": "ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat", "msg": "", "rc": 0, "start": "2026-01-12 08:58:55.029240", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} changed: [managed-node01] => (item=nest.test.redhat.com:/mnt/qa) => {"ansible_loop_var": "item", "changed": true, "cmd": "set -o pipefail\nentry=\"nest.test.redhat.com:/mnt/qa\"\ngrep -qF \"$entry\" /etc/fstab && sed -i \"s|^$entry|# $entry|\" /etc/fstab\n", "delta": "0:00:00.006408", "end": "2026-01-12 08:58:55.484703", "item": "nest.test.redhat.com:/mnt/qa", "msg": "", "rc": 0, "start": "2026-01-12 08:58:55.478295", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} changed: [managed-node01] => (item=vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive) => {"ansible_loop_var": "item", "changed": true, "cmd": "set -o pipefail\nentry=\"vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive\"\ngrep -qF \"$entry\" /etc/fstab && sed -i \"s|^$entry|# $entry|\" /etc/fstab\n", "delta": "0:00:00.006253", "end": "2026-01-12 08:58:55.890743", "item": "vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive", "msg": "", "rc": 0, "start": "2026-01-12 08:58:55.884490", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} changed: [managed-node01] => (item=nest.test.redhat.com:/mnt/tpsdist) => {"ansible_loop_var": "item", "changed": true, "cmd": "set -o pipefail\nentry=\"nest.test.redhat.com:/mnt/tpsdist\"\ngrep -qF \"$entry\" /etc/fstab && sed -i \"s|^$entry|# $entry|\" /etc/fstab\n", "delta": "0:00:00.005709", "end": "2026-01-12 08:58:56.279494", "item": "nest.test.redhat.com:/mnt/tpsdist", "msg": "", "rc": 0, "start": "2026-01-12 08:58:56.273785", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} changed: [managed-node01] => (item=ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot) => {"ansible_loop_var": "item", "changed": true, "cmd": "set -o pipefail\nentry=\"ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot\"\ngrep -qF \"$entry\" /etc/fstab && sed -i \"s|^$entry|# $entry|\" /etc/fstab\n", "delta": "0:00:00.005769", "end": "2026-01-12 08:58:56.663684", "item": "ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot", "msg": "", "rc": 0, "start": "2026-01-12 08:58:56.657915", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} changed: [managed-node01] => (item=ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch) => {"ansible_loop_var": "item", "changed": true, "cmd": "set -o pipefail\nentry=\"ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch\"\ngrep -qF \"$entry\" /etc/fstab && sed -i \"s|^$entry|# $entry|\" /etc/fstab\n", "delta": "0:00:00.006360", "end": "2026-01-12 08:58:57.074289", "item": "ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch", "msg": "", "rc": 0, "start": "2026-01-12 08:58:57.067929", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} TASK [infra.leapp.remediate : leapp_nfs_detected | Unmount NFS Mounts] ********* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_nfs_detected.yml:46 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [common_upgrade_tasks | Gather verify remediation tasks] ****************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:77 ok: [managed-node01 -> localhost] => {"changed": false, "examined": 1, "files": [{"atime": 1768226097.8323016, "ctime": 1768226097.5623047, "dev": 51716, "gid": 0, "gr_name": "root", "inode": 201326735, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1768226097.5623047, "nlink": 1, "path": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/verify/preupgrade/remediate_cifs.yml", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 503, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}], "matched": 1, "msg": "All paths examined", "skipped_paths": {}} TASK [common_upgrade_tasks | Verify remediations] ****************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:85 included: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/verify/preupgrade/remediate_cifs.yml for managed-node01 => (item=/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/verify/preupgrade/remediate_cifs.yml) TASK [preupgrade | remediate_cifs | Verify the cifs shares remediation] ******** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/verify/preupgrade/remediate_cifs.yml:5 ok: [managed-node01] => {"changed": false, "cmd": ["cat", "/etc/fstab"], "delta": "0:00:00.003030", "end": "2026-01-12 08:58:57.857848", "failed_when_result": false, "msg": "", "rc": 0, "start": "2026-01-12 08:58:57.854818", "stderr": "", "stderr_lines": [], "stdout": "UUID=68498833-f339-4c9e-b4ed-02e95341c6a8\t/\txfs\tdefaults\t0\t0\nUUID=26e01f46-d9b0-4cdf-82ea-dfd7f1d43ea2\t/boot\txfs\tdefaults\t0\t0\nUUID=F47C-006C\t/boot/efi\tvfat\tdefaults,uid=0,gid=0,umask=077,shortname=winnt\t0\t2\n# ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat nfs ro,rsize=32768,wsize=8192,bg,noauto,noatime,nosuid,nodev,intr,noauto 0 0\n# nest.test.redhat.com:/mnt/qa /mnt/qa nfs defaults,rsize=8192,wsize=8192,bg,noauto,noatime,nosuid,nodev,intr,noauto 0 0\n# vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive nfs ro,rsize=32768,wsize=8192,bg,noauto,noatime,nosuid,nodev,intr,noauto 0 0\n# nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist nfs defaults,rsize=8192,wsize=8192,bg,noauto,noatime,nosuid,nodev,intr,noauto 0 0\n# ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew nfs ro,rsize=32768,wsize=8192,bg,noauto,noatime,nosuid,nodev,intr,noauto 0 0\n# ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch nfs ro,rsize=32768,wsize=8192,bg,noauto,noatime,nosuid,nodev,intr,noauto 0 0\n# //127.0.0.1/test_remediate_cifs /mnt/cifs cifs username=test,password=test 0 0", "stdout_lines": ["UUID=68498833-f339-4c9e-b4ed-02e95341c6a8\t/\txfs\tdefaults\t0\t0", "UUID=26e01f46-d9b0-4cdf-82ea-dfd7f1d43ea2\t/boot\txfs\tdefaults\t0\t0", "UUID=F47C-006C\t/boot/efi\tvfat\tdefaults,uid=0,gid=0,umask=077,shortname=winnt\t0\t2", "# ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat nfs ro,rsize=32768,wsize=8192,bg,noauto,noatime,nosuid,nodev,intr,noauto 0 0", "# nest.test.redhat.com:/mnt/qa /mnt/qa nfs defaults,rsize=8192,wsize=8192,bg,noauto,noatime,nosuid,nodev,intr,noauto 0 0", "# vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive nfs ro,rsize=32768,wsize=8192,bg,noauto,noatime,nosuid,nodev,intr,noauto 0 0", "# nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist nfs defaults,rsize=8192,wsize=8192,bg,noauto,noatime,nosuid,nodev,intr,noauto 0 0", "# ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew nfs ro,rsize=32768,wsize=8192,bg,noauto,noatime,nosuid,nodev,intr,noauto 0 0", "# ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch nfs ro,rsize=32768,wsize=8192,bg,noauto,noatime,nosuid,nodev,intr,noauto 0 0", "# //127.0.0.1/test_remediate_cifs /mnt/cifs cifs username=test,password=test 0 0"]} TASK [common_upgrade_tasks | Flush handlers] *********************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:92 META: triggered running handlers for managed-node01 TASK [common_upgrade_tasks | Run analysis after remediation] ******************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:95 TASK [infra.leapp.common : Log directory exists] ******************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:3 ok: [managed-node01] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/var/log/ripu", "secontext": "unconfined_u:object_r:var_log_t:s0", "size": 38, "state": "directory", "uid": 0} TASK [infra.leapp.common : Check for existing log file] ************************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:11 ok: [managed-node01] => {"changed": false, "stat": {"exists": false}} TASK [infra.leapp.common : Fail if log file already exists] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:16 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : Create new log file] ******************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:23 NOTIFIED HANDLER infra.leapp.common : Check for log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Add end time to log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Slurp ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Decode ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Rename log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Check for log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Add end time to log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Slurp ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Decode ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Rename log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Check for log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Add end time to log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Slurp ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Decode ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Rename log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Check for log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Add end time to log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Slurp ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Decode ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Rename log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Check for log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Add end time to log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Slurp ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Decode ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Rename log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Check for log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Add end time to log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Slurp ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Decode ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Rename log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Check for log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Add end time to log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Slurp ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Decode ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Rename log file for managed-node01 changed: [managed-node01] => {"changed": true, "checksum": "d3c89a5c0445290a0c3fd8d17c372b2590850fee", "dest": "/var/log/ripu/ripu.log", "gid": 0, "group": "root", "md5sum": "66060d05ee73d91f01ffe0c1031550a0", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:var_log_t:s0", "size": 61, "src": "/root/.ansible/tmp/ansible-tmp-1768226338.9846005-9003-96165531509547/source", "state": "file", "uid": 0} TASK [infra.leapp.common : /etc/ansible/facts.d directory exists] ************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:35 ok: [managed-node01] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc/ansible/facts.d", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 57, "state": "directory", "uid": 0} TASK [infra.leapp.common : Capture current ansible_facts for validation after upgrade] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:43 ok: [managed-node01] => {"changed": false, "checksum": "33497605aefd908d1b9a53932fa84443d8876045", "dest": "/etc/ansible/facts.d/pre_ripu.fact", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/ansible/facts.d/pre_ripu.fact", "secontext": "system_u:object_r:etc_t:s0", "size": 14276, "state": "file", "uid": 0} TASK [infra.leapp.common : Capture a list of non-rhel versioned packages] ****** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:51 ok: [managed-node01] => {"changed": false, "cmd": "set -o pipefail; export PATH=$PATH; rpm -qa | grep -ve '[\\.|+]el9' | grep -vE '^(gpg-pubkey|libmodulemd|katello-ca-consumer)' | sort", "delta": "0:00:00.185915", "end": "2026-01-12 08:59:01.293218", "failed_when_result": false, "msg": "non-zero return code", "rc": 1, "start": "2026-01-12 08:59:01.107303", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} TASK [infra.leapp.common : Create fact with the non-rhel versioned packages list] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:65 ok: [managed-node01] => {"ansible_facts": {"non_rhel_packages": []}, "changed": false} TASK [infra.leapp.common : Capture the list of non-rhel versioned packages in a separate fact file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:69 ok: [managed-node01] => {"changed": false, "checksum": "97d170e1550eee4afc0af065b78cda302a97674c", "dest": "/etc/ansible/facts.d/non_rhel_packages.fact", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/ansible/facts.d/non_rhel_packages.fact", "secontext": "system_u:object_r:etc_t:s0", "size": 2, "state": "file", "uid": 0} TASK [infra.leapp.analysis : Include tasks for preupg assistant analysis] ****** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:9 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : Include tasks for leapp preupgrade analysis] ****** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:13 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml for managed-node01 TASK [infra.leapp.analysis : analysis-leapp | Register to leapp activation key] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:2 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [analysis-leapp | Include custom_local_repos for local_repos_pre_leapp] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:14 TASK [infra.leapp.common : custom_local_repos | Remove old /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:2 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : custom_local_repos | Enable custom upgrade yum repositories] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:9 skipping: [managed-node01] => {"changed": false, "skipped_reason": "No items in the list"} TASK [infra.leapp.analysis : analysis-leapp | Install packages for preupgrade analysis on RHEL 7] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:22 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : analysis-leapp | Install packages for preupgrade analysis on RHEL 8] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:29 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : analysis-leapp | Install packages for preupgrade analysis on RHEL 9] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:36 ok: [managed-node01] => {"changed": false, "msg": "Nothing to do", "rc": 0, "results": []} TASK [infra.leapp.analysis : analysis-leapp | Ensure leapp log directory exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:43 ok: [managed-node01] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/var/log/leapp", "secontext": "system_u:object_r:var_log_t:s0", "size": 146, "state": "directory", "uid": 0} TASK [infra.leapp.analysis : analysis-leapp | Populate leapp_answers file] ***** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:51 changed: [managed-node01] => {"changed": true, "checksum": "3d934ad808576e3a7fb4c14a89645a4ad55ccf53", "dest": "/var/log/leapp/answerfile", "gid": 0, "group": "root", "md5sum": "01e375235c8e4cafdec593b260354063", "mode": "0644", "owner": "root", "secontext": "unconfined_u:object_r:var_log_t:s0", "size": 48, "src": "/root/.ansible/tmp/ansible-tmp-1768226343.703982-9226-34621892519231/source", "state": "file", "uid": 0} TASK [analysis-leapp | Create /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:60 TASK [infra.leapp.common : custom_local_repos | Remove old /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:2 changed: [managed-node01] => {"changed": true, "path": "/etc/leapp/files/leapp_upgrade_repositories.repo", "state": "absent"} TASK [infra.leapp.common : custom_local_repos | Enable custom upgrade yum repositories] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:9 changed: [managed-node01] => (item={'name': 'rhel-10-for-x86_64-baseos-rpms', 'description': 'BaseOS for x86_64', 'baseurl': '__RHEL_10_0_BASEOS_REPO_URL__', 'state': 'present'}) => {"ansible_loop_var": "item", "changed": true, "item": {"baseurl": "__RHEL_10_0_BASEOS_REPO_URL__", "description": "BaseOS for x86_64", "name": "rhel-10-for-x86_64-baseos-rpms", "state": "present"}, "repo": "rhel-10-for-x86_64-baseos-rpms", "state": "present"} changed: [managed-node01] => (item={'name': 'rhel-10-for-x86_64-appstream-rpms', 'description': 'AppStream for x86_64', 'baseurl': '__RHEL_10_0_APPSTREAM_REPO_URL__', 'state': 'present'}) => {"ansible_loop_var": "item", "changed": true, "item": {"baseurl": "__RHEL_10_0_APPSTREAM_REPO_URL__", "description": "AppStream for x86_64", "name": "rhel-10-for-x86_64-appstream-rpms", "state": "present"}, "repo": "rhel-10-for-x86_64-appstream-rpms", "state": "present"} TASK [infra.leapp.analysis : analysis-leapp | Leapp preupgrade report] ********* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:71 ASYNC FAILED on managed-node01: jid=j757554439417.35981 changed: [managed-node01] => {"ansible_job_id": "j757554439417.35981", "changed": true, "cmd": "set -o pipefail; export PATH=$PATH; ulimit -n 16384; leapp preupgrade --report-schema=1.2.0 --no-rhsm 2>&1 | tee -a /var/log/ripu/ripu.log\n", "delta": "0:00:27.429389", "end": "2026-01-12 08:59:33.593941", "failed_when_result": false, "finished": 1, "msg": "non-zero return code", "rc": 1, "results_file": "/root/.ansible_async/j757554439417.35981", "start": "2026-01-12 08:59:06.164552", "started": 1, "stderr": "", "stderr_lines": [], "stdout": "\n============================================================\n UNSUPPORTED UPGRADE \n============================================================\n\nVariable LEAPP_UNSUPPORTED has been detected. Proceeding at your own risk.\nDevelopment variables have been detected:\n- LEAPP_DEVEL_RPMS_ALL_SIGNED=1\n\n============================================================\n UNSUPPORTED UPGRADE \n============================================================\n\n==> Processing phase `configuration_phase`\n====> * ipu_workflow_config\n IPU workflow config actor\n==> Processing phase `FactsCollection`\n====> * open_ssl_config_scanner\n Read an OpenSSL configuration file for further analysis.\n====> * scan_pam_user_db\n Scan the PAM service folder for the location of pam_userdb databases\n====> * storage_scanner\n Provides data about storage settings.\n====> * sssd_facts\n Check SSSD configuration for changes in RHEL10 and report them in model.\n====> * scan_source_boot_entry\n Scan the default boot entry of the source system.\n====> * transaction_workarounds\n Provides additional RPM transaction tasks based on bundled RPM packages.\n====> * repository_mapping\n Produces message containing repository mapping based on provided file.\n====> * ifcfg_scanner\n Scan ifcfg files with legacy network configuration\n====> * root_scanner\n Scan the system root directory and produce a message containing\n====> * scanclienablerepo\n Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.\n====> * system_facts\n Provides data about many facts from system.\n====> * get_enabled_modules\n Provides data about which module streams are enabled on the source system.\n====> * satellite_upgrade_services\n Reconfigure Satellite services\n====> * scan_target_os_image\n Scans the provided target OS ISO image to use as a content source for the IPU, if any.\n====> * luks_scanner\n Provides data about active LUKS devices.\n====> * xfs_info_scanner\n This actor scans all mounted mountpoints for XFS information.\n====> * rpm_scanner\n Provides data about installed RPM Packages.\n====> * scan_systemd_source\n Provides info about systemd on the source system\n====> * scan_default_initramfs\n Scan details of the default boot entry's initramfs image.\n====> * scancryptopolicies\n Scan information about system wide set crypto policies including:\n====> * copy_dnf_conf_into_target_userspace\n Copy dnf.conf into target userspace\n====> * scan_grub_device_name\n Find the name of the block devices where GRUB is located\n====> * scan_custom_modifications_actor\n Collects information about files in leapp directories that have been modified or newly added.\n====> * scan_hybrid_image_azure\n Check if the system is using Azure hybrid image.\n====> * scan_custom_repofile\n Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.\n====> * network_manager_read_config\n Provides data about NetworkManager configuration.\n====> * scandasd\n In case of s390x architecture, check whether DASD is used.\n====> * load_device_driver_deprecation_data\n Loads deprecation data for drivers and devices (PCI & CPU)\n====> * scan_files_for_target_userspace\n Scan the source system and identify files that will be copied into the target userspace when it is created.\n====> * scanmemory\n Scan Memory of the machine.\n====> * pci_devices_scanner\n Provides data about existing PCI Devices.\n====> * scan_grub_config\n Scan grub configuration files for errors.\n====> * scan_sap_hana\n Gathers information related to SAP HANA instances on the system.\n====> * scan_kernel_cmdline\n Scan the kernel command line of the booted system.\n====> * scan_source_files\n Scan files (explicitly specified) of the source system.\n====> * read_openssh_config\n Collect information about the OpenSSH configuration.\n====> * scan_pkg_manager\n Provides data about package manager (yum/dnf)\n====> * migrate_rpm_db\n Register a workaround to migrate RPM DB during the upgrade.\n====> * scanzfcp\n In case of s390x architecture, check whether ZFCP is used.\n====> * udevadm_info\n Produces data exported by the \"udevadm info\" command.\n====> * register_ruby_irb_adjustment\n Register a workaround to allow rubygem-irb's symlink -> directory conversion.\n====> * scan_subscription_manager_info\n Scans the current system for subscription manager information\n====> * persistentnetnames\n Get network interface information for physical ethernet interfaces of the original system.\n====> * remove_obsolete_gpg_keys\n Remove obsoleted RPM GPG keys.\n====> * selinuxcontentscanner\n Scan the system for any SELinux customizations\n====> * distribution_signed_rpm_scanner\n Provide data about distribution signed & third-party RPM packages.\n====> * trusted_gpg_keys_scanner\n Scan for trusted GPG keys.\n====> * ipa_scanner\n Scan system for ipa-client and ipa-server status\n====> * detect_kernel_drivers\n Matches all currently loaded kernel drivers against known deprecated and removed drivers.\n====> * checkrhui\n Check if system is using RHUI infrastructure (on public cloud) and send messages to\n====> * get_installed_desktops\n Actor checks if kde or gnome desktop environments\n====> * biosdevname\n Enable biosdevname on the target RHEL system if all interfaces on the source RHEL\n====> * repositories_blacklist\n Exclude target repositories provided by Red Hat without support.\n====> * scancpu\n Scan CPUs of the machine.\n====> * scan_dynamic_linker_configuration\n Scan the dynamic linker configuration and find modifications.\n====> * scan_fips\n Determine whether the source system has FIPS enabled.\n====> * persistentnetnamesdisable\n Disable systemd-udevd persistent network naming on machine with single eth0 NIC\n====> * rpm_transaction_config_tasks_collector\n Provides additional RPM transaction tasks from /etc/leapp/transaction.\n====> * pes_events_scanner\n Provides data about package events from Package Evolution Service.\n====> * scan_source_kernel\n Scan the source system kernel.\n====> * used_repository_scanner\n Scan used enabled repositories\n====> * scan_mysql\n Actor checking for presence of MySQL installation.\n====> * setuptargetrepos\n Produces list of repositories that should be available to be used during IPU process.\n==> Processing phase `Checks`\n====> * postgresql_check\n Actor checking for presence of PostgreSQL installation.\n====> * efi_check_boot\n Adjust EFI boot entry for first reboot\n====> * check_root_symlinks\n Check if the symlinks /bin and /lib are relative, not absolute.\n====> * check_grubenv_to_file\n Check whether grubenv is a symlink on Azure hybrid images using BIOS.\n====> * detect_grub_config_error\n Check grub configuration for various errors.\n====> * check_persistent_mounts\n Check if mounts required to be persistent are mounted in persistent fashion.\n====> * check_se_linux\n Check SELinux status and produce decision messages for further action.\n====> * check_skipped_repositories\n Produces a report if any repositories enabled on the system are going to be skipped.\n====> * check_systemd_broken_symlinks\n Check whether some systemd symlinks are broken\n====> * check_sap_hana\n If SAP HANA has been detected, several checks are performed to ensure a successful upgrade.\n====> * distribution_signed_rpm_check\n Check if there are any packages that are not signed by distribution GPG keys.\n====> * check_target_iso\n Check that the provided target ISO is a valid ISO image and is located on a persistent partition.\n====> * check_grub_core\n Check whether we are on legacy (BIOS) system and instruct Leapp to upgrade GRUB core\n====> * check_target_version\n Check that the target system version is supported by the upgrade process.\n====> * check_ipa_server\n Check for ipa-server and inhibit upgrade\n====> * check_system_arch\n Check if system is running at a supported architecture. If no, inhibit the upgrade process.\n====> * check_yum_plugins_enabled\n Checks that the required yum plugins are enabled.\n====> * bacula_check\n Actor checking for presence of Bacula installation.\n====> * checktargetrepos\n Check whether target yum repositories are specified.\n====> * sssd_check\n Check SSSD configuration for changes in RHEL10 and report them in model.\n====> * unsupported_upgrade_check\n Checks environment variables and produces a warning report if the upgrade is unsupported.\n====> * cephvolumescan\n Retrieves the list of encrypted Ceph OSD\n====> * check_boot_avail_space\n Check if at least 100Mib of available space on /boot. If not, inhibit the upgrade process.\n====> * check_default_initramfs\n Checks whether the default initramfs uses problematic dracut modules.\n====> * check_cifs\n Check if CIFS filesystem is in use. If yes, inhibit the upgrade process.\n====> * check_consumed_assets\n Check whether Leapp is using correct data assets.\n====> * check_custom_modifications_actor\n Checks CustomModifications messages and produces a report about files in leapp directories that have been\n====> * check_installed_kernels\n Inhibit IPU (in-place upgrade) when installed kernels conflict with a safe upgrade.\n====> * check_detected_devices_and_drivers\n Checks whether or not detected devices and drivers are usable on the target system.\n====> * check_pam_user_db\n Create report with the location of pam_userdb databases\n====> * check_dynamic_linker_configuration\n Check for customization of dynamic linker configuration.\n====> * mysql_check\n Actor checking for output produced by scanmysql actor.\n====> * check_etc_releasever\n Check releasever info and provide a guidance based on the facts\n====> * check_old_xfs\n Check mounted XFS file systems.\n====> * check_fips\n Inhibit upgrade if FIPS is detected as enabled.\n====> * network_deprecations\n Ensures that network configuration doesn't rely on unsupported settings\n====> * check_fstab_mount_order\n Checks order of entries in /etc/fstab based on their mount point and inhibits upgrade if overshadowing is detected.\n====> * crypto_policies_check\n This actor consumes previously gathered information about crypto policies on the source\n====> * inhibit_cgroupsv1\n Inhibit upgrade if cgroups-v1 are enabled\n====> * check_insights_auto_register\n Checks if system can be automatically registered into Red Hat Insights\n====> * libdb_check\n Actor checking for presence of libdb(Berkeley DB) installation.\n====> * check_rhsmsku\n Ensure the system is subscribed to the subscription manager\n====> * openssh_permit_root_login\n OpenSSH no longer allows root logins with password.\n====> * mariadb_check\n Actor checking for presence of MariaDB installation.\n====> * check_luks\n Check if any encrypted partitions are in use and whether they are supported for the upgrade.\n====> * open_ssl_engines_check\n The OpenSSL in RHEL 10 has deprecated engines in favor of providers.\n====> * checkmemory\n The actor check the size of RAM against RHEL8 minimal hardware requirements\n====> * check_rhsmsca\n Ensure that a registered system is in SCA (Simple Content Access)\n====> * check_microarchitecture\n Inhibit if RHEL9 microarchitecture requirements are not satisfied\n====> * check_mount_options\n Check for mount options preventing the upgrade.\n====> * check_nfs\n Check if NFS filesystem is in use. If yes, inhibit the upgrade process.\n====> * check_openssl_conf\n Check whether the openssl configuration and openssl-IBMCA.\n====> * check_os_release\n Check if the current RHEL minor version is supported. If not, inhibit the upgrade process.\n====> * check_rpm_transaction_events\n Filter RPM transaction events based on installed RPM packages\n====> * check_skip_phase\n Skip all the subsequent phases until the report phase.\n==> Processing phase `TargetTransactionFactsCollection`\n====> * create_iso_repofile\n Create custom repofile containing information about repositories found in target OS installation ISO, if used.\n====> * target_userspace_creator\n Initializes a directory to be populated as a minimal environment to run binaries from the target system.\nBaseOS for x86_64 0.0 B/s | 0 B 00:00 \n\n============================================================\n ERRORS \n============================================================\n\n2026-01-12 08:59:33.397530 [ERROR] Actor: target_userspace_creator\nMessage: Unable to install RHEL 10 userspace packages.\nSummary:\n Details: Command ['systemd-nspawn', '--register=no', '--quiet', '--keep-unit', '--capability=all', '--pipe', '-D', '/var/lib/leapp/scratch/mounts/root_/system_overlay', '--setenv=LEAPP_UNSUPPORTED=1', '--setenv=LEAPP_DEVEL_RPMS_ALL_SIGNED=1', '--setenv=LEAPP_HOSTNAME=managed-node01', '--setenv=LEAPP_EXPERIMENTAL=0', '--setenv=LEAPP_NO_RHSM=1', '--setenv=LEAPP_NO_RHSM_FACTS=1', '--setenv=LEAPP_TARGET_PRODUCT_CHANNEL=ga', '--setenv=LEAPP_UPGRADE_PATH_TARGET_RELEASE=10.1', '--setenv=LEAPP_UPGRADE_PATH_FLAVOUR=default', '--setenv=LEAPP_IPU_IN_PROGRESS=9to10', '--setenv=LEAPP_EXECUTION_ID=39804b35-9363-48b4-913d-c1c763a4dcc0', '--setenv=LEAPP_COMMON_TOOLS=:/etc/leapp/repos.d/system_upgrade/common/tools:/etc/leapp/repos.d/system_upgrade/el9toel10/tools', '--setenv=LEAPP_COMMON_FILES=:/etc/leapp/repos.d/system_upgrade/common/files:/etc/leapp/repos.d/system_upgrade/el9toel10/files', 'dnf', 'install', '-y', '--setopt=module_platform_id=platform:el10', '--setopt=keepcache=1', '--releasever', '10.1', '--installroot', '/el10target', '--disablerepo', '*', '--enablerepo', 'rhel-10-for-x86_64-baseos-rpms', '--enablerepo', 'rhel-10-for-x86_64-appstream-rpms', 'dnf-command(config-manager)', 'dnf', 'util-linux', '--disableplugin', 'subscription-manager'] failed with exit code 1.\n Stderr: Host and machine ids are equal (ec2dddb9db071e2dd37e6f88ff242637): refusing to link journals\n Error: Failed to download metadata for repo 'rhel-10-for-x86_64-baseos-rpms': Cannot download repomd.xml: Empty mirrorlist and no basepath specified!\n\n============================================================\n END OF ERRORS \n============================================================\n\nDebug output written to /var/log/leapp/leapp-preupgrade.log\n\n============================================================\n REPORT OVERVIEW \n============================================================\n\nFollowing errors occurred and the upgrade cannot continue:\n 1. Actor: target_userspace_creator\n Message: Unable to install RHEL 10 userspace packages.\n\nHIGH and MEDIUM severity reports:\n 1. GRUB2 core will be automatically updated during the upgrade\n 2. Upgrade is unsupported\n 3. Leapp detected a processor which is no longer maintained in RHEL 10.\n 4. Berkeley DB (libdb) has been detected on your system\n\nReports summary:\n Errors: 1\n Inhibitors: 0\n HIGH severity reports: 3\n MEDIUM severity reports: 1\n LOW severity reports: 1\n INFO severity reports: 2\n\nBefore continuing, review the full report below for details about discovered problems and possible remediation instructions:\n A report has been generated at /var/log/leapp/leapp-report.txt\n A report has been generated at /var/log/leapp/leapp-report.json\n\n============================================================\n END OF REPORT OVERVIEW \n============================================================\n\nAnswerfile has been generated at /var/log/leapp/answerfile", "stdout_lines": ["", "============================================================", " UNSUPPORTED UPGRADE ", "============================================================", "", "Variable LEAPP_UNSUPPORTED has been detected. Proceeding at your own risk.", "Development variables have been detected:", "- LEAPP_DEVEL_RPMS_ALL_SIGNED=1", "", "============================================================", " UNSUPPORTED UPGRADE ", "============================================================", "", "==> Processing phase `configuration_phase`", "====> * ipu_workflow_config", " IPU workflow config actor", "==> Processing phase `FactsCollection`", "====> * open_ssl_config_scanner", " Read an OpenSSL configuration file for further analysis.", "====> * scan_pam_user_db", " Scan the PAM service folder for the location of pam_userdb databases", "====> * storage_scanner", " Provides data about storage settings.", "====> * sssd_facts", " Check SSSD configuration for changes in RHEL10 and report them in model.", "====> * scan_source_boot_entry", " Scan the default boot entry of the source system.", "====> * transaction_workarounds", " Provides additional RPM transaction tasks based on bundled RPM packages.", "====> * repository_mapping", " Produces message containing repository mapping based on provided file.", "====> * ifcfg_scanner", " Scan ifcfg files with legacy network configuration", "====> * root_scanner", " Scan the system root directory and produce a message containing", "====> * scanclienablerepo", " Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.", "====> * system_facts", " Provides data about many facts from system.", "====> * get_enabled_modules", " Provides data about which module streams are enabled on the source system.", "====> * satellite_upgrade_services", " Reconfigure Satellite services", "====> * scan_target_os_image", " Scans the provided target OS ISO image to use as a content source for the IPU, if any.", "====> * luks_scanner", " Provides data about active LUKS devices.", "====> * xfs_info_scanner", " This actor scans all mounted mountpoints for XFS information.", "====> * rpm_scanner", " Provides data about installed RPM Packages.", "====> * scan_systemd_source", " Provides info about systemd on the source system", "====> * scan_default_initramfs", " Scan details of the default boot entry's initramfs image.", "====> * scancryptopolicies", " Scan information about system wide set crypto policies including:", "====> * copy_dnf_conf_into_target_userspace", " Copy dnf.conf into target userspace", "====> * scan_grub_device_name", " Find the name of the block devices where GRUB is located", "====> * scan_custom_modifications_actor", " Collects information about files in leapp directories that have been modified or newly added.", "====> * scan_hybrid_image_azure", " Check if the system is using Azure hybrid image.", "====> * scan_custom_repofile", " Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.", "====> * network_manager_read_config", " Provides data about NetworkManager configuration.", "====> * scandasd", " In case of s390x architecture, check whether DASD is used.", "====> * load_device_driver_deprecation_data", " Loads deprecation data for drivers and devices (PCI & CPU)", "====> * scan_files_for_target_userspace", " Scan the source system and identify files that will be copied into the target userspace when it is created.", "====> * scanmemory", " Scan Memory of the machine.", "====> * pci_devices_scanner", " Provides data about existing PCI Devices.", "====> * scan_grub_config", " Scan grub configuration files for errors.", "====> * scan_sap_hana", " Gathers information related to SAP HANA instances on the system.", "====> * scan_kernel_cmdline", " Scan the kernel command line of the booted system.", "====> * scan_source_files", " Scan files (explicitly specified) of the source system.", "====> * read_openssh_config", " Collect information about the OpenSSH configuration.", "====> * scan_pkg_manager", " Provides data about package manager (yum/dnf)", "====> * migrate_rpm_db", " Register a workaround to migrate RPM DB during the upgrade.", "====> * scanzfcp", " In case of s390x architecture, check whether ZFCP is used.", "====> * udevadm_info", " Produces data exported by the \"udevadm info\" command.", "====> * register_ruby_irb_adjustment", " Register a workaround to allow rubygem-irb's symlink -> directory conversion.", "====> * scan_subscription_manager_info", " Scans the current system for subscription manager information", "====> * persistentnetnames", " Get network interface information for physical ethernet interfaces of the original system.", "====> * remove_obsolete_gpg_keys", " Remove obsoleted RPM GPG keys.", "====> * selinuxcontentscanner", " Scan the system for any SELinux customizations", "====> * distribution_signed_rpm_scanner", " Provide data about distribution signed & third-party RPM packages.", "====> * trusted_gpg_keys_scanner", " Scan for trusted GPG keys.", "====> * ipa_scanner", " Scan system for ipa-client and ipa-server status", "====> * detect_kernel_drivers", " Matches all currently loaded kernel drivers against known deprecated and removed drivers.", "====> * checkrhui", " Check if system is using RHUI infrastructure (on public cloud) and send messages to", "====> * get_installed_desktops", " Actor checks if kde or gnome desktop environments", "====> * biosdevname", " Enable biosdevname on the target RHEL system if all interfaces on the source RHEL", "====> * repositories_blacklist", " Exclude target repositories provided by Red Hat without support.", "====> * scancpu", " Scan CPUs of the machine.", "====> * scan_dynamic_linker_configuration", " Scan the dynamic linker configuration and find modifications.", "====> * scan_fips", " Determine whether the source system has FIPS enabled.", "====> * persistentnetnamesdisable", " Disable systemd-udevd persistent network naming on machine with single eth0 NIC", "====> * rpm_transaction_config_tasks_collector", " Provides additional RPM transaction tasks from /etc/leapp/transaction.", "====> * pes_events_scanner", " Provides data about package events from Package Evolution Service.", "====> * scan_source_kernel", " Scan the source system kernel.", "====> * used_repository_scanner", " Scan used enabled repositories", "====> * scan_mysql", " Actor checking for presence of MySQL installation.", "====> * setuptargetrepos", " Produces list of repositories that should be available to be used during IPU process.", "==> Processing phase `Checks`", "====> * postgresql_check", " Actor checking for presence of PostgreSQL installation.", "====> * efi_check_boot", " Adjust EFI boot entry for first reboot", "====> * check_root_symlinks", " Check if the symlinks /bin and /lib are relative, not absolute.", "====> * check_grubenv_to_file", " Check whether grubenv is a symlink on Azure hybrid images using BIOS.", "====> * detect_grub_config_error", " Check grub configuration for various errors.", "====> * check_persistent_mounts", " Check if mounts required to be persistent are mounted in persistent fashion.", "====> * check_se_linux", " Check SELinux status and produce decision messages for further action.", "====> * check_skipped_repositories", " Produces a report if any repositories enabled on the system are going to be skipped.", "====> * check_systemd_broken_symlinks", " Check whether some systemd symlinks are broken", "====> * check_sap_hana", " If SAP HANA has been detected, several checks are performed to ensure a successful upgrade.", "====> * distribution_signed_rpm_check", " Check if there are any packages that are not signed by distribution GPG keys.", "====> * check_target_iso", " Check that the provided target ISO is a valid ISO image and is located on a persistent partition.", "====> * check_grub_core", " Check whether we are on legacy (BIOS) system and instruct Leapp to upgrade GRUB core", "====> * check_target_version", " Check that the target system version is supported by the upgrade process.", "====> * check_ipa_server", " Check for ipa-server and inhibit upgrade", "====> * check_system_arch", " Check if system is running at a supported architecture. If no, inhibit the upgrade process.", "====> * check_yum_plugins_enabled", " Checks that the required yum plugins are enabled.", "====> * bacula_check", " Actor checking for presence of Bacula installation.", "====> * checktargetrepos", " Check whether target yum repositories are specified.", "====> * sssd_check", " Check SSSD configuration for changes in RHEL10 and report them in model.", "====> * unsupported_upgrade_check", " Checks environment variables and produces a warning report if the upgrade is unsupported.", "====> * cephvolumescan", " Retrieves the list of encrypted Ceph OSD", "====> * check_boot_avail_space", " Check if at least 100Mib of available space on /boot. If not, inhibit the upgrade process.", "====> * check_default_initramfs", " Checks whether the default initramfs uses problematic dracut modules.", "====> * check_cifs", " Check if CIFS filesystem is in use. If yes, inhibit the upgrade process.", "====> * check_consumed_assets", " Check whether Leapp is using correct data assets.", "====> * check_custom_modifications_actor", " Checks CustomModifications messages and produces a report about files in leapp directories that have been", "====> * check_installed_kernels", " Inhibit IPU (in-place upgrade) when installed kernels conflict with a safe upgrade.", "====> * check_detected_devices_and_drivers", " Checks whether or not detected devices and drivers are usable on the target system.", "====> * check_pam_user_db", " Create report with the location of pam_userdb databases", "====> * check_dynamic_linker_configuration", " Check for customization of dynamic linker configuration.", "====> * mysql_check", " Actor checking for output produced by scanmysql actor.", "====> * check_etc_releasever", " Check releasever info and provide a guidance based on the facts", "====> * check_old_xfs", " Check mounted XFS file systems.", "====> * check_fips", " Inhibit upgrade if FIPS is detected as enabled.", "====> * network_deprecations", " Ensures that network configuration doesn't rely on unsupported settings", "====> * check_fstab_mount_order", " Checks order of entries in /etc/fstab based on their mount point and inhibits upgrade if overshadowing is detected.", "====> * crypto_policies_check", " This actor consumes previously gathered information about crypto policies on the source", "====> * inhibit_cgroupsv1", " Inhibit upgrade if cgroups-v1 are enabled", "====> * check_insights_auto_register", " Checks if system can be automatically registered into Red Hat Insights", "====> * libdb_check", " Actor checking for presence of libdb(Berkeley DB) installation.", "====> * check_rhsmsku", " Ensure the system is subscribed to the subscription manager", "====> * openssh_permit_root_login", " OpenSSH no longer allows root logins with password.", "====> * mariadb_check", " Actor checking for presence of MariaDB installation.", "====> * check_luks", " Check if any encrypted partitions are in use and whether they are supported for the upgrade.", "====> * open_ssl_engines_check", " The OpenSSL in RHEL 10 has deprecated engines in favor of providers.", "====> * checkmemory", " The actor check the size of RAM against RHEL8 minimal hardware requirements", "====> * check_rhsmsca", " Ensure that a registered system is in SCA (Simple Content Access)", "====> * check_microarchitecture", " Inhibit if RHEL9 microarchitecture requirements are not satisfied", "====> * check_mount_options", " Check for mount options preventing the upgrade.", "====> * check_nfs", " Check if NFS filesystem is in use. If yes, inhibit the upgrade process.", "====> * check_openssl_conf", " Check whether the openssl configuration and openssl-IBMCA.", "====> * check_os_release", " Check if the current RHEL minor version is supported. If not, inhibit the upgrade process.", "====> * check_rpm_transaction_events", " Filter RPM transaction events based on installed RPM packages", "====> * check_skip_phase", " Skip all the subsequent phases until the report phase.", "==> Processing phase `TargetTransactionFactsCollection`", "====> * create_iso_repofile", " Create custom repofile containing information about repositories found in target OS installation ISO, if used.", "====> * target_userspace_creator", " Initializes a directory to be populated as a minimal environment to run binaries from the target system.", "BaseOS for x86_64 0.0 B/s | 0 B 00:00 ", "", "============================================================", " ERRORS ", "============================================================", "", "2026-01-12 08:59:33.397530 [ERROR] Actor: target_userspace_creator", "Message: Unable to install RHEL 10 userspace packages.", "Summary:", " Details: Command ['systemd-nspawn', '--register=no', '--quiet', '--keep-unit', '--capability=all', '--pipe', '-D', '/var/lib/leapp/scratch/mounts/root_/system_overlay', '--setenv=LEAPP_UNSUPPORTED=1', '--setenv=LEAPP_DEVEL_RPMS_ALL_SIGNED=1', '--setenv=LEAPP_HOSTNAME=managed-node01', '--setenv=LEAPP_EXPERIMENTAL=0', '--setenv=LEAPP_NO_RHSM=1', '--setenv=LEAPP_NO_RHSM_FACTS=1', '--setenv=LEAPP_TARGET_PRODUCT_CHANNEL=ga', '--setenv=LEAPP_UPGRADE_PATH_TARGET_RELEASE=10.1', '--setenv=LEAPP_UPGRADE_PATH_FLAVOUR=default', '--setenv=LEAPP_IPU_IN_PROGRESS=9to10', '--setenv=LEAPP_EXECUTION_ID=39804b35-9363-48b4-913d-c1c763a4dcc0', '--setenv=LEAPP_COMMON_TOOLS=:/etc/leapp/repos.d/system_upgrade/common/tools:/etc/leapp/repos.d/system_upgrade/el9toel10/tools', '--setenv=LEAPP_COMMON_FILES=:/etc/leapp/repos.d/system_upgrade/common/files:/etc/leapp/repos.d/system_upgrade/el9toel10/files', 'dnf', 'install', '-y', '--setopt=module_platform_id=platform:el10', '--setopt=keepcache=1', '--releasever', '10.1', '--installroot', '/el10target', '--disablerepo', '*', '--enablerepo', 'rhel-10-for-x86_64-baseos-rpms', '--enablerepo', 'rhel-10-for-x86_64-appstream-rpms', 'dnf-command(config-manager)', 'dnf', 'util-linux', '--disableplugin', 'subscription-manager'] failed with exit code 1.", " Stderr: Host and machine ids are equal (ec2dddb9db071e2dd37e6f88ff242637): refusing to link journals", " Error: Failed to download metadata for repo 'rhel-10-for-x86_64-baseos-rpms': Cannot download repomd.xml: Empty mirrorlist and no basepath specified!", "", "============================================================", " END OF ERRORS ", "============================================================", "", "Debug output written to /var/log/leapp/leapp-preupgrade.log", "", "============================================================", " REPORT OVERVIEW ", "============================================================", "", "Following errors occurred and the upgrade cannot continue:", " 1. Actor: target_userspace_creator", " Message: Unable to install RHEL 10 userspace packages.", "", "HIGH and MEDIUM severity reports:", " 1. GRUB2 core will be automatically updated during the upgrade", " 2. Upgrade is unsupported", " 3. Leapp detected a processor which is no longer maintained in RHEL 10.", " 4. Berkeley DB (libdb) has been detected on your system", "", "Reports summary:", " Errors: 1", " Inhibitors: 0", " HIGH severity reports: 3", " MEDIUM severity reports: 1", " LOW severity reports: 1", " INFO severity reports: 2", "", "Before continuing, review the full report below for details about discovered problems and possible remediation instructions:", " A report has been generated at /var/log/leapp/leapp-report.txt", " A report has been generated at /var/log/leapp/leapp-report.json", "", "============================================================", " END OF REPORT OVERVIEW ", "============================================================", "", "Answerfile has been generated at /var/log/leapp/answerfile"]} TASK [analysis-leapp | Include custom_local_repos for local_repos_post_analysis] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:89 TASK [infra.leapp.common : custom_local_repos | Remove old /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:2 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : custom_local_repos | Enable custom upgrade yum repositories] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:9 skipping: [managed-node01] => {"changed": false, "skipped_reason": "No items in the list"} TASK [infra.leapp.analysis : analysis-leapp | Include check-results-file.yml] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:97 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/check-results-file.yml for managed-node01 TASK [infra.leapp.analysis : check-results-file | Result file status] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/check-results-file.yml:2 ok: [managed-node01] => {"changed": false, "stat": {"atime": 1768226373.4296136, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 16, "charset": "us-ascii", "checksum": "ba0e9fa843a3770e6236d81cbae9d51678ffabc1", "ctime": 1768226373.4306135, "dev": 51716, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 687866006, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1768226373.4306135, "nlink": 1, "path": "/var/log/leapp/leapp-report.txt", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 5807, "uid": 0, "version": "2006541916", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} TASK [infra.leapp.analysis : check-results-file | Check that result file exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/check-results-file.yml:7 ok: [managed-node01] => { "changed": false, "msg": "All assertions passed" } TASK [analysis-leapp | Run parse_leapp_report to check for inhibitors] ********* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:100 TASK [infra.leapp.common : parse_leapp_report | Default upgrade_inhibited to false] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:12 ok: [managed-node01] => {"ansible_facts": {"upgrade_inhibited": false}, "changed": false} TASK [infra.leapp.common : parse_leapp_report | Collect human readable report results] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:16 ok: [managed-node01] => {"changed": false, "content": "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", "encoding": "base64", "source": "/var/log/leapp/leapp-report.txt"} TASK [infra.leapp.common : parse_leapp_report | Collect JSON report results] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:21 ok: [managed-node01] => {"changed": false, "content": "{
  "entries": [
    {
      "audience": "sysadmin",
      "detail": {
        "remediations": [
          {
            "context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).",
            "type": "hint"
          }
        ]
      },
      "groups": [
        "repository",
        "failure"
      ],
      "key": "1b9132cb2362ae7830e48eee7811be9527747de8",
      "severity": "info",
      "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-for-rhel-10-s390x-eus-rpms\n- codeready-builder-beta-for-rhel-10-x86_64-rpms\n- codeready-builder-beta-for-rhel-10-aarch64-rpms\n- codeready-builder-for-rhel-10-ppc64le-rpms\n- codeready-builder-for-rhel-10-ppc64le-eus-rpms\n- codeready-builder-for-rhel-10-rhui-rpms\n- crb\n- codeready-builder-for-rhel-10-x86_64-eus-rpms\n- codeready-builder-for-rhel-10-aarch64-eus-rpms\n- codeready-builder-for-rhel-10-aarch64-rpms\n- codeready-builder-beta-for-rhel-10-s390x-rpms\n- codeready-builder-for-rhel-10-x86_64-rpms\n- rhui-codeready-builder-for-rhel-10-x86_64-rhui-rpms\n- rhui-codeready-builder-for-rhel-10-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-10-ppc64le-rpms\n- codeready-builder-for-rhel-10-s390x-rpms",
      "title": "Excluded target system repositories",
      "timeStamp": "2026-01-12T13:59:27.669028Z",
      "hostname": "managed-node01",
      "actor": "repositories_blacklist",
      "id": "1b2940c24322efa2e0a805b2bdfa0488492436626f2b8f0f3df23d6cadf448d8"
    },
    {
      "audience": "sysadmin",
      "groups": [
        "selinux",
        "security"
      ],
      "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72",
      "severity": "info",
      "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.",
      "title": "SElinux relabeling will be scheduled",
      "timeStamp": "2026-01-12T13:59:29.561617Z",
      "hostname": "managed-node01",
      "actor": "check_se_linux",
      "id": "601f69383942b668e17caf025efcba16f94c4ae03156f418086a641eb82f0e6e"
    },
    {
      "audience": "sysadmin",
      "detail": {
        "remediations": [
          {
            "context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.",
            "type": "hint"
          }
        ]
      },
      "groups": [
        "selinux",
        "security"
      ],
      "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f",
      "severity": "low",
      "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.",
      "title": "SElinux will be set to permissive mode",
      "timeStamp": "2026-01-12T13:59:29.564541Z",
      "hostname": "managed-node01",
      "actor": "check_se_linux",
      "id": "54aa30dfeb15c91ffc2b9ec2e36a0fb568821824ab960b10dbb2997c0179ecdf"
    },
    {
      "audience": "sysadmin",
      "groups": [
        "boot"
      ],
      "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3",
      "severity": "high",
      "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.",
      "title": "GRUB2 core will be automatically updated during the upgrade",
      "timeStamp": "2026-01-12T13:59:29.796131Z",
      "hostname": "managed-node01",
      "actor": "check_grub_core",
      "id": "293dfdb690a8c292081be76d857703d9e837609f1318020f23517cf5434814df"
    },
    {
      "audience": "sysadmin",
      "groups": [
        "upgrade process",
        "sanity"
      ],
      "key": "9e5088e3c1f371e020ec777c3d86578f4be143cf",
      "severity": "high",
      "summary": "Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.\n",
      "title": "Upgrade is unsupported",
      "timeStamp": "2026-01-12T13:59:30.260629Z",
      "hostname": "managed-node01",
      "actor": "unsupported_upgrade_check",
      "id": "7d7c7fa23f4b8b7375ec0cb7b3502cda7fd0f68b81e98db5d31d2adfd717f42e"
    },
    {
      "audience": "sysadmin",
      "groups": [
        "kernel",
        "boot"
      ],
      "key": "9dde4bcd8b458bd6803462216785df3a1476c1f8",
      "severity": "high",
      "summary": "The following processors are no longer maintained in RHEL 10:\n     - HASWELL_X\n",
      "title": "Leapp detected a processor which is no longer maintained in RHEL 10.",
      "timeStamp": "2026-01-12T13:59:30.613441Z",
      "hostname": "managed-node01",
      "actor": "check_detected_devices_and_drivers",
      "id": "0de70e6fb12424c8458cb92430e10dbeee72c71ee62c25e6fc8c8b7503cc0506"
    },
    {
      "audience": "sysadmin",
      "detail": {
        "external": [
          {
            "title": "Migrating to a RHEL 10 without libdb",
            "url": "https://access.redhat.com/articles/7099256"
          }
        ],
        "related_resources": [
          {
            "scheme": "package",
            "title": "libdb"
          }
        ],
        "remediations": [
          {
            "context": "Back up your data before proceeding with the data upgrade/migration. For the conversion, the tool db_converter from the libdb-utils rpm could be used. This database format conversion must be performed before the system upgrade. The db_converter is not available in RHEL 10 systems. For more information, see the provided article.",
            "type": "hint"
          }
        ]
      },
      "groups": [
        "services"
      ],
      "key": "fdc8f5b084e95922a4f59485a807a92cae2fc738",
      "severity": "medium",
      "summary": "Libdb was marked as deprecated in RHEL-9 and in RHEL-10 is not included anymore. There are a couple of alternatives in RHEL-10; the applications that depend on libdb will not work. Such applications must implement another type of backend storage. And migrate existing data to the new database format.",
      "title": "Berkeley DB (libdb) has been detected on your system",
      "timeStamp": "2026-01-12T13:59:31.173675Z",
      "hostname": "managed-node01",
      "actor": "libdb_check",
      "id": "6f807030a4b7dbdfe45d6114021f6f3363caa633ea9efb391ea9f9881bdab930"
    },
    {
      "audience": "sysadmin",
      "groups": [
        "error"
      ],
      "key": "cdffc88f6e6f69a6f8e1c86b2b96a9c4f1aa97e1",
      "severity": "high",
      "summary": "{\"details\": \"Command ['systemd-nspawn', '--register=no', '--quiet', '--keep-unit', '--capability=all', '--pipe', '-D', '/var/lib/leapp/scratch/mounts/root_/system_overlay', '--setenv=LEAPP_UNSUPPORTED=1', '--setenv=LEAPP_DEVEL_RPMS_ALL_SIGNED=1', '--setenv=LEAPP_HOSTNAME=managed-node01', '--setenv=LEAPP_EXPERIMENTAL=0', '--setenv=LEAPP_NO_RHSM=1', '--setenv=LEAPP_NO_RHSM_FACTS=1', '--setenv=LEAPP_TARGET_PRODUCT_CHANNEL=ga', '--setenv=LEAPP_UPGRADE_PATH_TARGET_RELEASE=10.1', '--setenv=LEAPP_UPGRADE_PATH_FLAVOUR=default', '--setenv=LEAPP_IPU_IN_PROGRESS=9to10', '--setenv=LEAPP_EXECUTION_ID=39804b35-9363-48b4-913d-c1c763a4dcc0', '--setenv=LEAPP_COMMON_TOOLS=:/etc/leapp/repos.d/system_upgrade/common/tools:/etc/leapp/repos.d/system_upgrade/el9toel10/tools', '--setenv=LEAPP_COMMON_FILES=:/etc/leapp/repos.d/system_upgrade/common/files:/etc/leapp/repos.d/system_upgrade/el9toel10/files', 'dnf', 'install', '-y', '--setopt=module_platform_id=platform:el10', '--setopt=keepcache=1', '--releasever', '10.1', '--installroot', '/el10target', '--disablerepo', '*', '--enablerepo', 'rhel-10-for-x86_64-baseos-rpms', '--enablerepo', 'rhel-10-for-x86_64-appstream-rpms', 'dnf-command(config-manager)', 'dnf', 'util-linux', '--disableplugin', 'subscription-manager'] failed with exit code 1.\", \"stderr\": \"Host and machine ids are equal (ec2dddb9db071e2dd37e6f88ff242637): refusing to link journals\\nError: Failed to download metadata for repo 'rhel-10-for-x86_64-baseos-rpms': Cannot download repomd.xml: Empty mirrorlist and no basepath specified!\\n\"}",
      "title": "Unable to install RHEL 10 userspace packages.",
      "timeStamp": "2026-01-12T13:59:33.397724Z",
      "hostname": "managed-node01",
      "actor": "target_userspace_creator",
      "id": "793ceb52b186cc9caf8b935d63dc52cfa525b740974e7b32190a4aac15326fd9"
    }
  ],
  "leapp_run_id": "39804b35-9363-48b4-913d-c1c763a4dcc0"
}
", "encoding": "base64", "source": "/var/log/leapp/leapp-report.json"} TASK [infra.leapp.common : parse_leapp_report | Parse report results] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:26 ok: [managed-node01] => {"ansible_facts": {"leapp_report_json": {"entries": [{"actor": "repositories_blacklist", "audience": "sysadmin", "detail": {"remediations": [{"context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "type": "hint"}]}, "groups": ["repository", "failure"], "hostname": "managed-node01", "id": "1b2940c24322efa2e0a805b2bdfa0488492436626f2b8f0f3df23d6cadf448d8", "key": "1b9132cb2362ae7830e48eee7811be9527747de8", "severity": "info", "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-for-rhel-10-s390x-eus-rpms\n- codeready-builder-beta-for-rhel-10-x86_64-rpms\n- codeready-builder-beta-for-rhel-10-aarch64-rpms\n- codeready-builder-for-rhel-10-ppc64le-rpms\n- codeready-builder-for-rhel-10-ppc64le-eus-rpms\n- codeready-builder-for-rhel-10-rhui-rpms\n- crb\n- codeready-builder-for-rhel-10-x86_64-eus-rpms\n- codeready-builder-for-rhel-10-aarch64-eus-rpms\n- codeready-builder-for-rhel-10-aarch64-rpms\n- codeready-builder-beta-for-rhel-10-s390x-rpms\n- codeready-builder-for-rhel-10-x86_64-rpms\n- rhui-codeready-builder-for-rhel-10-x86_64-rhui-rpms\n- rhui-codeready-builder-for-rhel-10-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-10-ppc64le-rpms\n- codeready-builder-for-rhel-10-s390x-rpms", "timeStamp": "2026-01-12T13:59:27.669028Z", "title": "Excluded target system repositories"}, {"actor": "check_se_linux", "audience": "sysadmin", "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "601f69383942b668e17caf025efcba16f94c4ae03156f418086a641eb82f0e6e", "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", "severity": "info", "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", "timeStamp": "2026-01-12T13:59:29.561617Z", "title": "SElinux relabeling will be scheduled"}, {"actor": "check_se_linux", "audience": "sysadmin", "detail": {"remediations": [{"context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.", "type": "hint"}]}, "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "54aa30dfeb15c91ffc2b9ec2e36a0fb568821824ab960b10dbb2997c0179ecdf", "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", "severity": "low", "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", "timeStamp": "2026-01-12T13:59:29.564541Z", "title": "SElinux will be set to permissive mode"}, {"actor": "check_grub_core", "audience": "sysadmin", "groups": ["boot"], "hostname": "managed-node01", "id": "293dfdb690a8c292081be76d857703d9e837609f1318020f23517cf5434814df", "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", "severity": "high", "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", "timeStamp": "2026-01-12T13:59:29.796131Z", "title": "GRUB2 core will be automatically updated during the upgrade"}, {"actor": "unsupported_upgrade_check", "audience": "sysadmin", "groups": ["upgrade process", "sanity"], "hostname": "managed-node01", "id": "7d7c7fa23f4b8b7375ec0cb7b3502cda7fd0f68b81e98db5d31d2adfd717f42e", "key": "9e5088e3c1f371e020ec777c3d86578f4be143cf", "severity": "high", "summary": "Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.\n", "timeStamp": "2026-01-12T13:59:30.260629Z", "title": "Upgrade is unsupported"}, {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "groups": ["kernel", "boot"], "hostname": "managed-node01", "id": "0de70e6fb12424c8458cb92430e10dbeee72c71ee62c25e6fc8c8b7503cc0506", "key": "9dde4bcd8b458bd6803462216785df3a1476c1f8", "severity": "high", "summary": "The following processors are no longer maintained in RHEL 10:\n - HASWELL_X\n", "timeStamp": "2026-01-12T13:59:30.613441Z", "title": "Leapp detected a processor which is no longer maintained in RHEL 10."}, {"actor": "libdb_check", "audience": "sysadmin", "detail": {"external": [{"title": "Migrating to a RHEL 10 without libdb", "url": "https://access.redhat.com/articles/7099256"}], "related_resources": [{"scheme": "package", "title": "libdb"}], "remediations": [{"context": "Back up your data before proceeding with the data upgrade/migration. For the conversion, the tool db_converter from the libdb-utils rpm could be used. This database format conversion must be performed before the system upgrade. The db_converter is not available in RHEL 10 systems. For more information, see the provided article.", "type": "hint"}]}, "groups": ["services"], "hostname": "managed-node01", "id": "6f807030a4b7dbdfe45d6114021f6f3363caa633ea9efb391ea9f9881bdab930", "key": "fdc8f5b084e95922a4f59485a807a92cae2fc738", "severity": "medium", "summary": "Libdb was marked as deprecated in RHEL-9 and in RHEL-10 is not included anymore. There are a couple of alternatives in RHEL-10; the applications that depend on libdb will not work. Such applications must implement another type of backend storage. And migrate existing data to the new database format.", "timeStamp": "2026-01-12T13:59:31.173675Z", "title": "Berkeley DB (libdb) has been detected on your system"}, {"actor": "target_userspace_creator", "audience": "sysadmin", "groups": ["error"], "hostname": "managed-node01", "id": "793ceb52b186cc9caf8b935d63dc52cfa525b740974e7b32190a4aac15326fd9", "key": "cdffc88f6e6f69a6f8e1c86b2b96a9c4f1aa97e1", "severity": "high", "summary": "{\"details\": \"Command ['systemd-nspawn', '--register=no', '--quiet', '--keep-unit', '--capability=all', '--pipe', '-D', '/var/lib/leapp/scratch/mounts/root_/system_overlay', '--setenv=LEAPP_UNSUPPORTED=1', '--setenv=LEAPP_DEVEL_RPMS_ALL_SIGNED=1', '--setenv=LEAPP_HOSTNAME=managed-node01', '--setenv=LEAPP_EXPERIMENTAL=0', '--setenv=LEAPP_NO_RHSM=1', '--setenv=LEAPP_NO_RHSM_FACTS=1', '--setenv=LEAPP_TARGET_PRODUCT_CHANNEL=ga', '--setenv=LEAPP_UPGRADE_PATH_TARGET_RELEASE=10.1', '--setenv=LEAPP_UPGRADE_PATH_FLAVOUR=default', '--setenv=LEAPP_IPU_IN_PROGRESS=9to10', '--setenv=LEAPP_EXECUTION_ID=39804b35-9363-48b4-913d-c1c763a4dcc0', '--setenv=LEAPP_COMMON_TOOLS=:/etc/leapp/repos.d/system_upgrade/common/tools:/etc/leapp/repos.d/system_upgrade/el9toel10/tools', '--setenv=LEAPP_COMMON_FILES=:/etc/leapp/repos.d/system_upgrade/common/files:/etc/leapp/repos.d/system_upgrade/el9toel10/files', 'dnf', 'install', '-y', '--setopt=module_platform_id=platform:el10', '--setopt=keepcache=1', '--releasever', '10.1', '--installroot', '/el10target', '--disablerepo', '*', '--enablerepo', 'rhel-10-for-x86_64-baseos-rpms', '--enablerepo', 'rhel-10-for-x86_64-appstream-rpms', 'dnf-command(config-manager)', 'dnf', 'util-linux', '--disableplugin', 'subscription-manager'] failed with exit code 1.\", \"stderr\": \"Host and machine ids are equal (ec2dddb9db071e2dd37e6f88ff242637): refusing to link journals\\nError: Failed to download metadata for repo 'rhel-10-for-x86_64-baseos-rpms': Cannot download repomd.xml: Empty mirrorlist and no basepath specified!\\n\"}", "timeStamp": "2026-01-12T13:59:33.397724Z", "title": "Unable to install RHEL 10 userspace packages."}], "leapp_run_id": "39804b35-9363-48b4-913d-c1c763a4dcc0"}, "leapp_report_txt": ["Risk Factor: high (error)", "Title: Unable to install RHEL 10 userspace packages.", "Summary: {\"details\": \"Command ['systemd-nspawn', '--register=no', '--quiet', '--keep-unit', '--capability=all', '--pipe', '-D', '/var/lib/leapp/scratch/mounts/root_/system_overlay', '--setenv=LEAPP_UNSUPPORTED=1', '--setenv=LEAPP_DEVEL_RPMS_ALL_SIGNED=1', '--setenv=LEAPP_HOSTNAME=managed-node01', '--setenv=LEAPP_EXPERIMENTAL=0', '--setenv=LEAPP_NO_RHSM=1', '--setenv=LEAPP_NO_RHSM_FACTS=1', '--setenv=LEAPP_TARGET_PRODUCT_CHANNEL=ga', '--setenv=LEAPP_UPGRADE_PATH_TARGET_RELEASE=10.1', '--setenv=LEAPP_UPGRADE_PATH_FLAVOUR=default', '--setenv=LEAPP_IPU_IN_PROGRESS=9to10', '--setenv=LEAPP_EXECUTION_ID=39804b35-9363-48b4-913d-c1c763a4dcc0', '--setenv=LEAPP_COMMON_TOOLS=:/etc/leapp/repos.d/system_upgrade/common/tools:/etc/leapp/repos.d/system_upgrade/el9toel10/tools', '--setenv=LEAPP_COMMON_FILES=:/etc/leapp/repos.d/system_upgrade/common/files:/etc/leapp/repos.d/system_upgrade/el9toel10/files', 'dnf', 'install', '-y', '--setopt=module_platform_id=platform:el10', '--setopt=keepcache=1', '--releasever', '10.1', '--installroot', '/el10target', '--disablerepo', '*', '--enablerepo', 'rhel-10-for-x86_64-baseos-rpms', '--enablerepo', 'rhel-10-for-x86_64-appstream-rpms', 'dnf-command(config-manager)', 'dnf', 'util-linux', '--disableplugin', 'subscription-manager'] failed with exit code 1.\", \"stderr\": \"Host and machine ids are equal (ec2dddb9db071e2dd37e6f88ff242637): refusing to link journals\\nError: Failed to download metadata for repo 'rhel-10-for-x86_64-baseos-rpms': Cannot download repomd.xml: Empty mirrorlist and no basepath specified!\\n\"}", "Key: cdffc88f6e6f69a6f8e1c86b2b96a9c4f1aa97e1", "----------------------------------------", "Risk Factor: high ", "Title: GRUB2 core will be automatically updated during the upgrade", "Summary: On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", "Key: ac7030e05d2ee248d34f08a9fa040b352bc410a3", "----------------------------------------", "Risk Factor: high ", "Title: Upgrade is unsupported", "Summary: Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.", "", "Key: 9e5088e3c1f371e020ec777c3d86578f4be143cf", "----------------------------------------", "Risk Factor: high ", "Title: Leapp detected a processor which is no longer maintained in RHEL 10.", "Summary: The following processors are no longer maintained in RHEL 10:", " - HASWELL_X", "", "Key: 9dde4bcd8b458bd6803462216785df3a1476c1f8", "----------------------------------------", "Risk Factor: medium ", "Title: Berkeley DB (libdb) has been detected on your system", "Summary: Libdb was marked as deprecated in RHEL-9 and in RHEL-10 is not included anymore. There are a couple of alternatives in RHEL-10; the applications that depend on libdb will not work. Such applications must implement another type of backend storage. And migrate existing data to the new database format.", "Related links:", " - Migrating to a RHEL 10 without libdb: https://access.redhat.com/articles/7099256", "Remediation: [hint] Back up your data before proceeding with the data upgrade/migration. For the conversion, the tool db_converter from the libdb-utils rpm could be used. This database format conversion must be performed before the system upgrade. The db_converter is not available in RHEL 10 systems. For more information, see the provided article.", "Key: fdc8f5b084e95922a4f59485a807a92cae2fc738", "----------------------------------------", "Risk Factor: low ", "Title: SElinux will be set to permissive mode", "Summary: SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", "Remediation: [hint] Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.", "Key: 39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", "----------------------------------------", "Risk Factor: info ", "Title: Excluded target system repositories", "Summary: The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.", "- codeready-builder-for-rhel-10-s390x-eus-rpms", "- codeready-builder-beta-for-rhel-10-x86_64-rpms", "- codeready-builder-beta-for-rhel-10-aarch64-rpms", "- codeready-builder-for-rhel-10-ppc64le-rpms", "- codeready-builder-for-rhel-10-ppc64le-eus-rpms", "- codeready-builder-for-rhel-10-rhui-rpms", "- crb", "- codeready-builder-for-rhel-10-x86_64-eus-rpms", "- codeready-builder-for-rhel-10-aarch64-eus-rpms", "- codeready-builder-for-rhel-10-aarch64-rpms", "- codeready-builder-beta-for-rhel-10-s390x-rpms", "- codeready-builder-for-rhel-10-x86_64-rpms", "- rhui-codeready-builder-for-rhel-10-x86_64-rhui-rpms", "- rhui-codeready-builder-for-rhel-10-aarch64-rhui-rpms", "- codeready-builder-beta-for-rhel-10-ppc64le-rpms", "- codeready-builder-for-rhel-10-s390x-rpms", "Remediation: [hint] If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "Key: 1b9132cb2362ae7830e48eee7811be9527747de8", "----------------------------------------", "Risk Factor: info ", "Title: SElinux relabeling will be scheduled", "Summary: SElinux relabeling will be scheduled as the status is permissive/enforcing.", "Key: 8fb81863f8413bd617c2a55b69b8e10ff03d7c72", "----------------------------------------", ""]}, "changed": false} TASK [infra.leapp.common : parse_leapp_report | Check for inhibitors] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:32 skipping: [managed-node01] => (item={'audience': 'sysadmin', 'detail': {'remediations': [{'context': 'If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).', 'type': 'hint'}]}, 'groups': ['repository', 'failure'], 'key': '1b9132cb2362ae7830e48eee7811be9527747de8', 'severity': 'info', 'summary': 'The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-for-rhel-10-s390x-eus-rpms\n- codeready-builder-beta-for-rhel-10-x86_64-rpms\n- codeready-builder-beta-for-rhel-10-aarch64-rpms\n- codeready-builder-for-rhel-10-ppc64le-rpms\n- codeready-builder-for-rhel-10-ppc64le-eus-rpms\n- codeready-builder-for-rhel-10-rhui-rpms\n- crb\n- codeready-builder-for-rhel-10-x86_64-eus-rpms\n- codeready-builder-for-rhel-10-aarch64-eus-rpms\n- codeready-builder-for-rhel-10-aarch64-rpms\n- codeready-builder-beta-for-rhel-10-s390x-rpms\n- codeready-builder-for-rhel-10-x86_64-rpms\n- rhui-codeready-builder-for-rhel-10-x86_64-rhui-rpms\n- rhui-codeready-builder-for-rhel-10-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-10-ppc64le-rpms\n- codeready-builder-for-rhel-10-s390x-rpms', 'title': 'Excluded target system repositories', 'timeStamp': '2026-01-12T13:59:27.669028Z', 'hostname': 'managed-node01', 'actor': 'repositories_blacklist', 'id': '1b2940c24322efa2e0a805b2bdfa0488492436626f2b8f0f3df23d6cadf448d8'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "repositories_blacklist", "audience": "sysadmin", "detail": {"remediations": [{"context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "type": "hint"}]}, "groups": ["repository", "failure"], "hostname": "managed-node01", "id": "1b2940c24322efa2e0a805b2bdfa0488492436626f2b8f0f3df23d6cadf448d8", "key": "1b9132cb2362ae7830e48eee7811be9527747de8", "severity": "info", "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-for-rhel-10-s390x-eus-rpms\n- codeready-builder-beta-for-rhel-10-x86_64-rpms\n- codeready-builder-beta-for-rhel-10-aarch64-rpms\n- codeready-builder-for-rhel-10-ppc64le-rpms\n- codeready-builder-for-rhel-10-ppc64le-eus-rpms\n- codeready-builder-for-rhel-10-rhui-rpms\n- crb\n- codeready-builder-for-rhel-10-x86_64-eus-rpms\n- codeready-builder-for-rhel-10-aarch64-eus-rpms\n- codeready-builder-for-rhel-10-aarch64-rpms\n- codeready-builder-beta-for-rhel-10-s390x-rpms\n- codeready-builder-for-rhel-10-x86_64-rpms\n- rhui-codeready-builder-for-rhel-10-x86_64-rhui-rpms\n- rhui-codeready-builder-for-rhel-10-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-10-ppc64le-rpms\n- codeready-builder-for-rhel-10-s390x-rpms", "timeStamp": "2026-01-12T13:59:27.669028Z", "title": "Excluded target system repositories"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'audience': 'sysadmin', 'groups': ['selinux', 'security'], 'key': '8fb81863f8413bd617c2a55b69b8e10ff03d7c72', 'severity': 'info', 'summary': 'SElinux relabeling will be scheduled as the status is permissive/enforcing.', 'title': 'SElinux relabeling will be scheduled', 'timeStamp': '2026-01-12T13:59:29.561617Z', 'hostname': 'managed-node01', 'actor': 'check_se_linux', 'id': '601f69383942b668e17caf025efcba16f94c4ae03156f418086a641eb82f0e6e'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_se_linux", "audience": "sysadmin", "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "601f69383942b668e17caf025efcba16f94c4ae03156f418086a641eb82f0e6e", "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", "severity": "info", "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", "timeStamp": "2026-01-12T13:59:29.561617Z", "title": "SElinux relabeling will be scheduled"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'audience': 'sysadmin', 'detail': {'remediations': [{'context': 'Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the "/root/tmp_leapp_py3" SElinux warnings.', 'type': 'hint'}]}, 'groups': ['selinux', 'security'], 'key': '39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f', 'severity': 'low', 'summary': 'SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.', 'title': 'SElinux will be set to permissive mode', 'timeStamp': '2026-01-12T13:59:29.564541Z', 'hostname': 'managed-node01', 'actor': 'check_se_linux', 'id': '54aa30dfeb15c91ffc2b9ec2e36a0fb568821824ab960b10dbb2997c0179ecdf'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_se_linux", "audience": "sysadmin", "detail": {"remediations": [{"context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.", "type": "hint"}]}, "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "54aa30dfeb15c91ffc2b9ec2e36a0fb568821824ab960b10dbb2997c0179ecdf", "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", "severity": "low", "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", "timeStamp": "2026-01-12T13:59:29.564541Z", "title": "SElinux will be set to permissive mode"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'audience': 'sysadmin', 'groups': ['boot'], 'key': 'ac7030e05d2ee248d34f08a9fa040b352bc410a3', 'severity': 'high', 'summary': 'On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running "grub2-install" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.', 'title': 'GRUB2 core will be automatically updated during the upgrade', 'timeStamp': '2026-01-12T13:59:29.796131Z', 'hostname': 'managed-node01', 'actor': 'check_grub_core', 'id': '293dfdb690a8c292081be76d857703d9e837609f1318020f23517cf5434814df'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_grub_core", "audience": "sysadmin", "groups": ["boot"], "hostname": "managed-node01", "id": "293dfdb690a8c292081be76d857703d9e837609f1318020f23517cf5434814df", "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", "severity": "high", "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", "timeStamp": "2026-01-12T13:59:29.796131Z", "title": "GRUB2 core will be automatically updated during the upgrade"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'audience': 'sysadmin', 'groups': ['upgrade process', 'sanity'], 'key': '9e5088e3c1f371e020ec777c3d86578f4be143cf', 'severity': 'high', 'summary': 'Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.\n', 'title': 'Upgrade is unsupported', 'timeStamp': '2026-01-12T13:59:30.260629Z', 'hostname': 'managed-node01', 'actor': 'unsupported_upgrade_check', 'id': '7d7c7fa23f4b8b7375ec0cb7b3502cda7fd0f68b81e98db5d31d2adfd717f42e'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "unsupported_upgrade_check", "audience": "sysadmin", "groups": ["upgrade process", "sanity"], "hostname": "managed-node01", "id": "7d7c7fa23f4b8b7375ec0cb7b3502cda7fd0f68b81e98db5d31d2adfd717f42e", "key": "9e5088e3c1f371e020ec777c3d86578f4be143cf", "severity": "high", "summary": "Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.\n", "timeStamp": "2026-01-12T13:59:30.260629Z", "title": "Upgrade is unsupported"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'audience': 'sysadmin', 'groups': ['kernel', 'boot'], 'key': '9dde4bcd8b458bd6803462216785df3a1476c1f8', 'severity': 'high', 'summary': 'The following processors are no longer maintained in RHEL 10:\n - HASWELL_X\n', 'title': 'Leapp detected a processor which is no longer maintained in RHEL 10.', 'timeStamp': '2026-01-12T13:59:30.613441Z', 'hostname': 'managed-node01', 'actor': 'check_detected_devices_and_drivers', 'id': '0de70e6fb12424c8458cb92430e10dbeee72c71ee62c25e6fc8c8b7503cc0506'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "groups": ["kernel", "boot"], "hostname": "managed-node01", "id": "0de70e6fb12424c8458cb92430e10dbeee72c71ee62c25e6fc8c8b7503cc0506", "key": "9dde4bcd8b458bd6803462216785df3a1476c1f8", "severity": "high", "summary": "The following processors are no longer maintained in RHEL 10:\n - HASWELL_X\n", "timeStamp": "2026-01-12T13:59:30.613441Z", "title": "Leapp detected a processor which is no longer maintained in RHEL 10."}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'audience': 'sysadmin', 'detail': {'external': [{'title': 'Migrating to a RHEL 10 without libdb', 'url': 'https://access.redhat.com/articles/7099256'}], 'related_resources': [{'scheme': 'package', 'title': 'libdb'}], 'remediations': [{'context': 'Back up your data before proceeding with the data upgrade/migration. For the conversion, the tool db_converter from the libdb-utils rpm could be used. This database format conversion must be performed before the system upgrade. The db_converter is not available in RHEL 10 systems. For more information, see the provided article.', 'type': 'hint'}]}, 'groups': ['services'], 'key': 'fdc8f5b084e95922a4f59485a807a92cae2fc738', 'severity': 'medium', 'summary': 'Libdb was marked as deprecated in RHEL-9 and in RHEL-10 is not included anymore. There are a couple of alternatives in RHEL-10; the applications that depend on libdb will not work. Such applications must implement another type of backend storage. And migrate existing data to the new database format.', 'title': 'Berkeley DB (libdb) has been detected on your system', 'timeStamp': '2026-01-12T13:59:31.173675Z', 'hostname': 'managed-node01', 'actor': 'libdb_check', 'id': '6f807030a4b7dbdfe45d6114021f6f3363caa633ea9efb391ea9f9881bdab930'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "libdb_check", "audience": "sysadmin", "detail": {"external": [{"title": "Migrating to a RHEL 10 without libdb", "url": "https://access.redhat.com/articles/7099256"}], "related_resources": [{"scheme": "package", "title": "libdb"}], "remediations": [{"context": "Back up your data before proceeding with the data upgrade/migration. For the conversion, the tool db_converter from the libdb-utils rpm could be used. This database format conversion must be performed before the system upgrade. The db_converter is not available in RHEL 10 systems. For more information, see the provided article.", "type": "hint"}]}, "groups": ["services"], "hostname": "managed-node01", "id": "6f807030a4b7dbdfe45d6114021f6f3363caa633ea9efb391ea9f9881bdab930", "key": "fdc8f5b084e95922a4f59485a807a92cae2fc738", "severity": "medium", "summary": "Libdb was marked as deprecated in RHEL-9 and in RHEL-10 is not included anymore. There are a couple of alternatives in RHEL-10; the applications that depend on libdb will not work. Such applications must implement another type of backend storage. And migrate existing data to the new database format.", "timeStamp": "2026-01-12T13:59:31.173675Z", "title": "Berkeley DB (libdb) has been detected on your system"}, "skip_reason": "Conditional result was False"} ok: [managed-node01] => (item={'audience': 'sysadmin', 'groups': ['error'], 'key': 'cdffc88f6e6f69a6f8e1c86b2b96a9c4f1aa97e1', 'severity': 'high', 'summary': '{"details": "Command [\'systemd-nspawn\', \'--register=no\', \'--quiet\', \'--keep-unit\', \'--capability=all\', \'--pipe\', \'-D\', \'/var/lib/leapp/scratch/mounts/root_/system_overlay\', \'--setenv=LEAPP_UNSUPPORTED=1\', \'--setenv=LEAPP_DEVEL_RPMS_ALL_SIGNED=1\', \'--setenv=LEAPP_HOSTNAME=managed-node01\', \'--setenv=LEAPP_EXPERIMENTAL=0\', \'--setenv=LEAPP_NO_RHSM=1\', \'--setenv=LEAPP_NO_RHSM_FACTS=1\', \'--setenv=LEAPP_TARGET_PRODUCT_CHANNEL=ga\', \'--setenv=LEAPP_UPGRADE_PATH_TARGET_RELEASE=10.1\', \'--setenv=LEAPP_UPGRADE_PATH_FLAVOUR=default\', \'--setenv=LEAPP_IPU_IN_PROGRESS=9to10\', \'--setenv=LEAPP_EXECUTION_ID=39804b35-9363-48b4-913d-c1c763a4dcc0\', \'--setenv=LEAPP_COMMON_TOOLS=:/etc/leapp/repos.d/system_upgrade/common/tools:/etc/leapp/repos.d/system_upgrade/el9toel10/tools\', \'--setenv=LEAPP_COMMON_FILES=:/etc/leapp/repos.d/system_upgrade/common/files:/etc/leapp/repos.d/system_upgrade/el9toel10/files\', \'dnf\', \'install\', \'-y\', \'--setopt=module_platform_id=platform:el10\', \'--setopt=keepcache=1\', \'--releasever\', \'10.1\', \'--installroot\', \'/el10target\', \'--disablerepo\', \'*\', \'--enablerepo\', \'rhel-10-for-x86_64-baseos-rpms\', \'--enablerepo\', \'rhel-10-for-x86_64-appstream-rpms\', \'dnf-command(config-manager)\', \'dnf\', \'util-linux\', \'--disableplugin\', \'subscription-manager\'] failed with exit code 1.", "stderr": "Host and machine ids are equal (ec2dddb9db071e2dd37e6f88ff242637): refusing to link journals\\nError: Failed to download metadata for repo \'rhel-10-for-x86_64-baseos-rpms\': Cannot download repomd.xml: Empty mirrorlist and no basepath specified!\\n"}', 'title': 'Unable to install RHEL 10 userspace packages.', 'timeStamp': '2026-01-12T13:59:33.397724Z', 'hostname': 'managed-node01', 'actor': 'target_userspace_creator', 'id': '793ceb52b186cc9caf8b935d63dc52cfa525b740974e7b32190a4aac15326fd9'}) => {"ansible_facts": {"leapp_inhibitors": [{"actor": "check_cifs", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "7d1a4b2859cfa9a9e47e0986278a60695a41893cd51aab1ec41188d0316b902f", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2026-01-12T13:58:05.022466Z", "title": "Use of CIFS detected. Upgrade can't proceed"}, {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "209ca2ad519594527e5c95cd2a1c08c66833738d593d41ff0aa73d82ef3c72db", "key": "48e04852631245aa4afee9adcdc7c2375b8cffb8", "severity": "high", "summary": "Support for the following RHEL 9 device drivers has been removed in RHEL 10:\n - qla3xxx\n - vmw_pvrdma\n", "timeStamp": "2026-01-12T13:58:05.219121Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed."}, {"actor": "network_deprecations", "audience": "sysadmin", "detail": {"external": [{"title": "How to migrate the connection from ifcfg to NetworkManager keyfile plugin?", "url": "https://access.redhat.com/solutions/7083803"}, {"title": "nmcli(1) manual, describes \"connection migrate\" sub-command.", "url": "https://networkmanager.dev/docs/api/latest/nmcli.html"}, {"title": "nm-settings-ifcfg-rh(5), description of the \"ifcfg\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html"}, {"title": "nm-settings-keyfile(5), description of the \"keyfile\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html"}], "related_resources": [{"scheme": "package", "title": "NetworkManager"}, {"scheme": "file", "title": "/etc/sysconfig/network-scripts/ifcfg-eth0"}], "remediations": [{"context": "Convert the configuration into NetworkManager native \"keyfile\" format.", "type": "hint"}, {"context": ["nmcli", "connection", "migrate", "/etc/sysconfig/network-scripts/ifcfg-eth0"], "type": "command"}]}, "groups": ["network", "services", "inhibitor"], "hostname": "managed-node01", "id": "f475031f70e687cdddd38e4e97b94cbcc771b878102484e33af86b6a12ae64f0", "key": "7de70b43c3c9d20075e30894ac24a4c4e2d70837", "severity": "high", "summary": "Network configuration files in legacy \"ifcfg\" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:\n - /etc/sysconfig/network-scripts/ifcfg-eth0", "timeStamp": "2026-01-12T13:58:05.501987Z", "title": "Legacy network configuration found"}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "830bde6c37fe89aa3306731ef54dcc83b5ee7564cfeeb1af8e4e7d82f037b5a8", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n", "timeStamp": "2026-01-12T13:58:06.297471Z", "title": "Use of NFS detected. Upgrade can't proceed"}, {"actor": "target_userspace_creator", "audience": "sysadmin", "groups": ["error"], "hostname": "managed-node01", "id": "793ceb52b186cc9caf8b935d63dc52cfa525b740974e7b32190a4aac15326fd9", "key": "cdffc88f6e6f69a6f8e1c86b2b96a9c4f1aa97e1", "severity": "high", "summary": "{\"details\": \"Command ['systemd-nspawn', '--register=no', '--quiet', '--keep-unit', '--capability=all', '--pipe', '-D', '/var/lib/leapp/scratch/mounts/root_/system_overlay', '--setenv=LEAPP_UNSUPPORTED=1', '--setenv=LEAPP_DEVEL_RPMS_ALL_SIGNED=1', '--setenv=LEAPP_HOSTNAME=managed-node01', '--setenv=LEAPP_EXPERIMENTAL=0', '--setenv=LEAPP_NO_RHSM=1', '--setenv=LEAPP_NO_RHSM_FACTS=1', '--setenv=LEAPP_TARGET_PRODUCT_CHANNEL=ga', '--setenv=LEAPP_UPGRADE_PATH_TARGET_RELEASE=10.1', '--setenv=LEAPP_UPGRADE_PATH_FLAVOUR=default', '--setenv=LEAPP_IPU_IN_PROGRESS=9to10', '--setenv=LEAPP_EXECUTION_ID=39804b35-9363-48b4-913d-c1c763a4dcc0', '--setenv=LEAPP_COMMON_TOOLS=:/etc/leapp/repos.d/system_upgrade/common/tools:/etc/leapp/repos.d/system_upgrade/el9toel10/tools', '--setenv=LEAPP_COMMON_FILES=:/etc/leapp/repos.d/system_upgrade/common/files:/etc/leapp/repos.d/system_upgrade/el9toel10/files', 'dnf', 'install', '-y', '--setopt=module_platform_id=platform:el10', '--setopt=keepcache=1', '--releasever', '10.1', '--installroot', '/el10target', '--disablerepo', '*', '--enablerepo', 'rhel-10-for-x86_64-baseos-rpms', '--enablerepo', 'rhel-10-for-x86_64-appstream-rpms', 'dnf-command(config-manager)', 'dnf', 'util-linux', '--disableplugin', 'subscription-manager'] failed with exit code 1.\", \"stderr\": \"Host and machine ids are equal (ec2dddb9db071e2dd37e6f88ff242637): refusing to link journals\\nError: Failed to download metadata for repo 'rhel-10-for-x86_64-baseos-rpms': Cannot download repomd.xml: Empty mirrorlist and no basepath specified!\\n\"}", "timeStamp": "2026-01-12T13:59:33.397724Z", "title": "Unable to install RHEL 10 userspace packages."}], "upgrade_inhibited": true}, "ansible_loop_var": "item", "changed": false, "item": {"actor": "target_userspace_creator", "audience": "sysadmin", "groups": ["error"], "hostname": "managed-node01", "id": "793ceb52b186cc9caf8b935d63dc52cfa525b740974e7b32190a4aac15326fd9", "key": "cdffc88f6e6f69a6f8e1c86b2b96a9c4f1aa97e1", "severity": "high", "summary": "{\"details\": \"Command ['systemd-nspawn', '--register=no', '--quiet', '--keep-unit', '--capability=all', '--pipe', '-D', '/var/lib/leapp/scratch/mounts/root_/system_overlay', '--setenv=LEAPP_UNSUPPORTED=1', '--setenv=LEAPP_DEVEL_RPMS_ALL_SIGNED=1', '--setenv=LEAPP_HOSTNAME=managed-node01', '--setenv=LEAPP_EXPERIMENTAL=0', '--setenv=LEAPP_NO_RHSM=1', '--setenv=LEAPP_NO_RHSM_FACTS=1', '--setenv=LEAPP_TARGET_PRODUCT_CHANNEL=ga', '--setenv=LEAPP_UPGRADE_PATH_TARGET_RELEASE=10.1', '--setenv=LEAPP_UPGRADE_PATH_FLAVOUR=default', '--setenv=LEAPP_IPU_IN_PROGRESS=9to10', '--setenv=LEAPP_EXECUTION_ID=39804b35-9363-48b4-913d-c1c763a4dcc0', '--setenv=LEAPP_COMMON_TOOLS=:/etc/leapp/repos.d/system_upgrade/common/tools:/etc/leapp/repos.d/system_upgrade/el9toel10/tools', '--setenv=LEAPP_COMMON_FILES=:/etc/leapp/repos.d/system_upgrade/common/files:/etc/leapp/repos.d/system_upgrade/el9toel10/files', 'dnf', 'install', '-y', '--setopt=module_platform_id=platform:el10', '--setopt=keepcache=1', '--releasever', '10.1', '--installroot', '/el10target', '--disablerepo', '*', '--enablerepo', 'rhel-10-for-x86_64-baseos-rpms', '--enablerepo', 'rhel-10-for-x86_64-appstream-rpms', 'dnf-command(config-manager)', 'dnf', 'util-linux', '--disableplugin', 'subscription-manager'] failed with exit code 1.\", \"stderr\": \"Host and machine ids are equal (ec2dddb9db071e2dd37e6f88ff242637): refusing to link journals\\nError: Failed to download metadata for repo 'rhel-10-for-x86_64-baseos-rpms': Cannot download repomd.xml: Empty mirrorlist and no basepath specified!\\n\"}", "timeStamp": "2026-01-12T13:59:33.397724Z", "title": "Unable to install RHEL 10 userspace packages."}} TASK [infra.leapp.common : parse_leapp_report | Collect inhibitors] ************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:44 ok: [managed-node01] => {"changed": false, "cmd": ["awk", "/\\(inhibitor\\)/,/^-------/", "/var/log/leapp/leapp-report.txt"], "delta": "0:00:00.004022", "end": "2026-01-12 09:00:08.748994", "failed_when_result": false, "msg": "", "rc": 0, "start": "2026-01-12 09:00:08.744972", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} TASK [infra.leapp.common : parse_leapp_report | Collect high errors] *********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:53 ok: [managed-node01] => {"changed": false, "cmd": ["awk", "/high \\(error\\)/,/^-------/", "/var/log/leapp/leapp-report.txt"], "delta": "0:00:00.004802", "end": "2026-01-12 09:00:09.113539", "failed_when_result": false, "msg": "", "rc": 0, "start": "2026-01-12 09:00:09.108737", "stderr": "", "stderr_lines": [], "stdout": "Risk Factor: high (error)\nTitle: Unable to install RHEL 10 userspace packages.\nSummary: {\"details\": \"Command ['systemd-nspawn', '--register=no', '--quiet', '--keep-unit', '--capability=all', '--pipe', '-D', '/var/lib/leapp/scratch/mounts/root_/system_overlay', '--setenv=LEAPP_UNSUPPORTED=1', '--setenv=LEAPP_DEVEL_RPMS_ALL_SIGNED=1', '--setenv=LEAPP_HOSTNAME=managed-node01', '--setenv=LEAPP_EXPERIMENTAL=0', '--setenv=LEAPP_NO_RHSM=1', '--setenv=LEAPP_NO_RHSM_FACTS=1', '--setenv=LEAPP_TARGET_PRODUCT_CHANNEL=ga', '--setenv=LEAPP_UPGRADE_PATH_TARGET_RELEASE=10.1', '--setenv=LEAPP_UPGRADE_PATH_FLAVOUR=default', '--setenv=LEAPP_IPU_IN_PROGRESS=9to10', '--setenv=LEAPP_EXECUTION_ID=39804b35-9363-48b4-913d-c1c763a4dcc0', '--setenv=LEAPP_COMMON_TOOLS=:/etc/leapp/repos.d/system_upgrade/common/tools:/etc/leapp/repos.d/system_upgrade/el9toel10/tools', '--setenv=LEAPP_COMMON_FILES=:/etc/leapp/repos.d/system_upgrade/common/files:/etc/leapp/repos.d/system_upgrade/el9toel10/files', 'dnf', 'install', '-y', '--setopt=module_platform_id=platform:el10', '--setopt=keepcache=1', '--releasever', '10.1', '--installroot', '/el10target', '--disablerepo', '*', '--enablerepo', 'rhel-10-for-x86_64-baseos-rpms', '--enablerepo', 'rhel-10-for-x86_64-appstream-rpms', 'dnf-command(config-manager)', 'dnf', 'util-linux', '--disableplugin', 'subscription-manager'] failed with exit code 1.\", \"stderr\": \"Host and machine ids are equal (ec2dddb9db071e2dd37e6f88ff242637): refusing to link journals\\nError: Failed to download metadata for repo 'rhel-10-for-x86_64-baseos-rpms': Cannot download repomd.xml: Empty mirrorlist and no basepath specified!\\n\"}\nKey: cdffc88f6e6f69a6f8e1c86b2b96a9c4f1aa97e1\n----------------------------------------", "stdout_lines": ["Risk Factor: high (error)", "Title: Unable to install RHEL 10 userspace packages.", "Summary: {\"details\": \"Command ['systemd-nspawn', '--register=no', '--quiet', '--keep-unit', '--capability=all', '--pipe', '-D', '/var/lib/leapp/scratch/mounts/root_/system_overlay', '--setenv=LEAPP_UNSUPPORTED=1', '--setenv=LEAPP_DEVEL_RPMS_ALL_SIGNED=1', '--setenv=LEAPP_HOSTNAME=managed-node01', '--setenv=LEAPP_EXPERIMENTAL=0', '--setenv=LEAPP_NO_RHSM=1', '--setenv=LEAPP_NO_RHSM_FACTS=1', '--setenv=LEAPP_TARGET_PRODUCT_CHANNEL=ga', '--setenv=LEAPP_UPGRADE_PATH_TARGET_RELEASE=10.1', '--setenv=LEAPP_UPGRADE_PATH_FLAVOUR=default', '--setenv=LEAPP_IPU_IN_PROGRESS=9to10', '--setenv=LEAPP_EXECUTION_ID=39804b35-9363-48b4-913d-c1c763a4dcc0', '--setenv=LEAPP_COMMON_TOOLS=:/etc/leapp/repos.d/system_upgrade/common/tools:/etc/leapp/repos.d/system_upgrade/el9toel10/tools', '--setenv=LEAPP_COMMON_FILES=:/etc/leapp/repos.d/system_upgrade/common/files:/etc/leapp/repos.d/system_upgrade/el9toel10/files', 'dnf', 'install', '-y', '--setopt=module_platform_id=platform:el10', '--setopt=keepcache=1', '--releasever', '10.1', '--installroot', '/el10target', '--disablerepo', '*', '--enablerepo', 'rhel-10-for-x86_64-baseos-rpms', '--enablerepo', 'rhel-10-for-x86_64-appstream-rpms', 'dnf-command(config-manager)', 'dnf', 'util-linux', '--disableplugin', 'subscription-manager'] failed with exit code 1.\", \"stderr\": \"Host and machine ids are equal (ec2dddb9db071e2dd37e6f88ff242637): refusing to link journals\\nError: Failed to download metadata for repo 'rhel-10-for-x86_64-baseos-rpms': Cannot download repomd.xml: Empty mirrorlist and no basepath specified!\\n\"}", "Key: cdffc88f6e6f69a6f8e1c86b2b96a9c4f1aa97e1", "----------------------------------------"]} TASK [infra.leapp.analysis : Set stats for leapp_inhibitors] ******************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:17 ok: [managed-node01] => {"ansible_stats": {"aggregate": true, "data": {"leapp_inhibitors": [{"actor": "check_cifs", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "7d1a4b2859cfa9a9e47e0986278a60695a41893cd51aab1ec41188d0316b902f", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2026-01-12T13:58:05.022466Z", "title": "Use of CIFS detected. Upgrade can't proceed"}, {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "209ca2ad519594527e5c95cd2a1c08c66833738d593d41ff0aa73d82ef3c72db", "key": "48e04852631245aa4afee9adcdc7c2375b8cffb8", "severity": "high", "summary": "Support for the following RHEL 9 device drivers has been removed in RHEL 10:\n - qla3xxx\n - vmw_pvrdma\n", "timeStamp": "2026-01-12T13:58:05.219121Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 10. Upgrade cannot proceed."}, {"actor": "network_deprecations", "audience": "sysadmin", "detail": {"external": [{"title": "How to migrate the connection from ifcfg to NetworkManager keyfile plugin?", "url": "https://access.redhat.com/solutions/7083803"}, {"title": "nmcli(1) manual, describes \"connection migrate\" sub-command.", "url": "https://networkmanager.dev/docs/api/latest/nmcli.html"}, {"title": "nm-settings-ifcfg-rh(5), description of the \"ifcfg\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-ifcfg-rh.html"}, {"title": "nm-settings-keyfile(5), description of the \"keyfile\" format", "url": "https://networkmanager.dev/docs/api/latest/nm-settings-keyfile.html"}], "related_resources": [{"scheme": "package", "title": "NetworkManager"}, {"scheme": "file", "title": "/etc/sysconfig/network-scripts/ifcfg-eth0"}], "remediations": [{"context": "Convert the configuration into NetworkManager native \"keyfile\" format.", "type": "hint"}, {"context": ["nmcli", "connection", "migrate", "/etc/sysconfig/network-scripts/ifcfg-eth0"], "type": "command"}]}, "groups": ["network", "services", "inhibitor"], "hostname": "managed-node01", "id": "f475031f70e687cdddd38e4e97b94cbcc771b878102484e33af86b6a12ae64f0", "key": "7de70b43c3c9d20075e30894ac24a4c4e2d70837", "severity": "high", "summary": "Network configuration files in legacy \"ifcfg\" format are present.In Red Hat Enterprise Linux 10, support for these files is no longer enabled and the configuration will be ignored. The following files were found:\n - /etc/sysconfig/network-scripts/ifcfg-eth0", "timeStamp": "2026-01-12T13:58:05.501987Z", "title": "Legacy network configuration found"}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "830bde6c37fe89aa3306731ef54dcc83b5ee7564cfeeb1af8e4e7d82f037b5a8", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n", "timeStamp": "2026-01-12T13:58:06.297471Z", "title": "Use of NFS detected. Upgrade can't proceed"}, {"actor": "target_userspace_creator", "audience": "sysadmin", "groups": ["error"], "hostname": "managed-node01", "id": "793ceb52b186cc9caf8b935d63dc52cfa525b740974e7b32190a4aac15326fd9", "key": "cdffc88f6e6f69a6f8e1c86b2b96a9c4f1aa97e1", "severity": "high", "summary": "{\"details\": \"Command ['systemd-nspawn', '--register=no', '--quiet', '--keep-unit', '--capability=all', '--pipe', '-D', '/var/lib/leapp/scratch/mounts/root_/system_overlay', '--setenv=LEAPP_UNSUPPORTED=1', '--setenv=LEAPP_DEVEL_RPMS_ALL_SIGNED=1', '--setenv=LEAPP_HOSTNAME=managed-node01', '--setenv=LEAPP_EXPERIMENTAL=0', '--setenv=LEAPP_NO_RHSM=1', '--setenv=LEAPP_NO_RHSM_FACTS=1', '--setenv=LEAPP_TARGET_PRODUCT_CHANNEL=ga', '--setenv=LEAPP_UPGRADE_PATH_TARGET_RELEASE=10.1', '--setenv=LEAPP_UPGRADE_PATH_FLAVOUR=default', '--setenv=LEAPP_IPU_IN_PROGRESS=9to10', '--setenv=LEAPP_EXECUTION_ID=39804b35-9363-48b4-913d-c1c763a4dcc0', '--setenv=LEAPP_COMMON_TOOLS=:/etc/leapp/repos.d/system_upgrade/common/tools:/etc/leapp/repos.d/system_upgrade/el9toel10/tools', '--setenv=LEAPP_COMMON_FILES=:/etc/leapp/repos.d/system_upgrade/common/files:/etc/leapp/repos.d/system_upgrade/el9toel10/files', 'dnf', 'install', '-y', '--setopt=module_platform_id=platform:el10', '--setopt=keepcache=1', '--releasever', '10.1', '--installroot', '/el10target', '--disablerepo', '*', '--enablerepo', 'rhel-10-for-x86_64-baseos-rpms', '--enablerepo', 'rhel-10-for-x86_64-appstream-rpms', 'dnf-command(config-manager)', 'dnf', 'util-linux', '--disableplugin', 'subscription-manager'] failed with exit code 1.\", \"stderr\": \"Host and machine ids are equal (ec2dddb9db071e2dd37e6f88ff242637): refusing to link journals\\nError: Failed to download metadata for repo 'rhel-10-for-x86_64-baseos-rpms': Cannot download repomd.xml: Empty mirrorlist and no basepath specified!\\n\"}", "timeStamp": "2026-01-12T13:59:33.397724Z", "title": "Unable to install RHEL 10 userspace packages."}]}, "per_host": false}, "changed": false} TASK [infra.leapp.analysis : Notify analysis report is done handler] *********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:22 NOTIFIED HANDLER infra.leapp.analysis : Preupgrade analysis report is done for managed-node01 NOTIFIED HANDLER infra.leapp.analysis : Display inhibitors for managed-node01 NOTIFIED HANDLER infra.leapp.analysis : Display errors for managed-node01 changed: [managed-node01] => {"changed": true, "msg": "All assertions passed"} TASK [common_upgrade_tasks | Flush handlers] *********************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:99 META: triggered running handlers for managed-node01 RUNNING HANDLER [infra.leapp.common : Check for log file] ********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:3 ok: [managed-node01] => {"changed": false, "stat": {"atime": 1768226339.5766776, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 32, "charset": "us-ascii", "checksum": "3890e607f2e8cdc9895bd992f450b9f8fa65bf4b", "ctime": 1768226373.5496135, "dev": 51716, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 8390259, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1768226373.5496135, "nlink": 1, "path": "/var/log/ripu/ripu.log", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 16318, "uid": 0, "version": "753146169", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} RUNNING HANDLER [infra.leapp.common : Add end time to log file] **************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:9 changed: [managed-node01] => {"backup": "", "changed": true, "msg": "line added"} RUNNING HANDLER [infra.leapp.common : Slurp ripu.log file] ********************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:19 ok: [managed-node01] => {"changed": false, "content": "RIPU preupgrade analysis
Job started at 2026-01-12T13:58:58Z

============================================================
                    UNSUPPORTED UPGRADE                     
============================================================

Variable LEAPP_UNSUPPORTED has been detected. Proceeding at your own risk.
Development variables have been detected:
- LEAPP_DEVEL_RPMS_ALL_SIGNED=1

============================================================
                    UNSUPPORTED UPGRADE                     
============================================================

==> Processing phase `configuration_phase`
====> * ipu_workflow_config
        IPU workflow config actor
==> Processing phase `FactsCollection`
====> * open_ssl_config_scanner
        Read an OpenSSL configuration file for further analysis.
====> * scan_pam_user_db
        Scan the PAM service folder for the location of pam_userdb databases
====> * storage_scanner
        Provides data about storage settings.
====> * sssd_facts
        Check SSSD configuration for changes in RHEL10 and report them in model.
====> * scan_source_boot_entry
        Scan the default boot entry of the source system.
====> * transaction_workarounds
        Provides additional RPM transaction tasks based on bundled RPM packages.
====> * repository_mapping
        Produces message containing repository mapping based on provided file.
====> * ifcfg_scanner
        Scan ifcfg files with legacy network configuration
====> * root_scanner
        Scan the system root directory and produce a message containing
====> * scanclienablerepo
        Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.
====> * system_facts
        Provides data about many facts from system.
====> * get_enabled_modules
        Provides data about which module streams are enabled on the source system.
====> * satellite_upgrade_services
        Reconfigure Satellite services
====> * scan_target_os_image
        Scans the provided target OS ISO image to use as a content source for the IPU, if any.
====> * luks_scanner
        Provides data about active LUKS devices.
====> * xfs_info_scanner
        This actor scans all mounted mountpoints for XFS information.
====> * rpm_scanner
        Provides data about installed RPM Packages.
====> * scan_systemd_source
        Provides info about systemd on the source system
====> * scan_default_initramfs
        Scan details of the default boot entry's initramfs image.
====> * scancryptopolicies
        Scan information about system wide set crypto policies including:
====> * copy_dnf_conf_into_target_userspace
        Copy dnf.conf into target userspace
====> * scan_grub_device_name
        Find the name of the block devices where GRUB is located
====> * scan_custom_modifications_actor
        Collects information about files in leapp directories that have been modified or newly added.
====> * scan_hybrid_image_azure
        Check if the system is using Azure hybrid image.
====> * scan_custom_repofile
        Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.
====> * network_manager_read_config
        Provides data about NetworkManager configuration.
====> * scandasd
        In case of s390x architecture, check whether DASD is used.
====> * load_device_driver_deprecation_data
        Loads deprecation data for drivers and devices (PCI & CPU)
====> * scan_files_for_target_userspace
        Scan the source system and identify files that will be copied into the target userspace when it is created.
====> * scanmemory
        Scan Memory of the machine.
====> * pci_devices_scanner
        Provides data about existing PCI Devices.
====> * scan_grub_config
        Scan grub configuration files for errors.
====> * scan_sap_hana
        Gathers information related to SAP HANA instances on the system.
====> * scan_kernel_cmdline
        Scan the kernel command line of the booted system.
====> * scan_source_files
        Scan files (explicitly specified) of the source system.
====> * read_openssh_config
        Collect information about the OpenSSH configuration.
====> * scan_pkg_manager
        Provides data about package manager (yum/dnf)
====> * migrate_rpm_db
        Register a workaround to migrate RPM DB during the upgrade.
====> * scanzfcp
        In case of s390x architecture, check whether ZFCP is used.
====> * udevadm_info
        Produces data exported by the "udevadm info" command.
====> * register_ruby_irb_adjustment
        Register a workaround to allow rubygem-irb's symlink -> directory conversion.
====> * scan_subscription_manager_info
        Scans the current system for subscription manager information
====> * persistentnetnames
        Get network interface information for physical ethernet interfaces of the original system.
====> * remove_obsolete_gpg_keys
        Remove obsoleted RPM GPG keys.
====> * selinuxcontentscanner
        Scan the system for any SELinux customizations
====> * distribution_signed_rpm_scanner
        Provide data about distribution signed & third-party RPM packages.
====> * trusted_gpg_keys_scanner
        Scan for trusted GPG keys.
====> * ipa_scanner
        Scan system for ipa-client and ipa-server status
====> * detect_kernel_drivers
        Matches all currently loaded kernel drivers against known deprecated and removed drivers.
====> * checkrhui
        Check if system is using RHUI infrastructure (on public cloud) and send messages to
====> * get_installed_desktops
        Actor checks if kde or gnome desktop environments
====> * biosdevname
        Enable biosdevname on the target RHEL system if all interfaces on the source RHEL
====> * repositories_blacklist
        Exclude target repositories provided by Red Hat without support.
====> * scancpu
        Scan CPUs of the machine.
====> * scan_dynamic_linker_configuration
        Scan the dynamic linker configuration and find modifications.
====> * scan_fips
        Determine whether the source system has FIPS enabled.
====> * persistentnetnamesdisable
        Disable systemd-udevd persistent network naming on machine with single eth0 NIC
====> * rpm_transaction_config_tasks_collector
        Provides additional RPM transaction tasks from /etc/leapp/transaction.
====> * pes_events_scanner
        Provides data about package events from Package Evolution Service.
====> * scan_source_kernel
        Scan the source system kernel.
====> * used_repository_scanner
        Scan used enabled repositories
====> * scan_mysql
        Actor checking for presence of MySQL installation.
====> * setuptargetrepos
        Produces list of repositories that should be available to be used during IPU process.
==> Processing phase `Checks`
====> * postgresql_check
        Actor checking for presence of PostgreSQL installation.
====> * efi_check_boot
        Adjust EFI boot entry for first reboot
====> * check_root_symlinks
        Check if the symlinks /bin and /lib are relative, not absolute.
====> * check_grubenv_to_file
        Check whether grubenv is a symlink on Azure hybrid images using BIOS.
====> * detect_grub_config_error
        Check grub configuration for various errors.
====> * check_persistent_mounts
        Check if mounts required to be persistent are mounted in persistent fashion.
====> * check_se_linux
        Check SELinux status and produce decision messages for further action.
====> * check_skipped_repositories
        Produces a report if any repositories enabled on the system are going to be skipped.
====> * check_systemd_broken_symlinks
        Check whether some systemd symlinks are broken
====> * check_sap_hana
        If SAP HANA has been detected, several checks are performed to ensure a successful upgrade.
====> * distribution_signed_rpm_check
        Check if there are any packages that are not signed by distribution GPG keys.
====> * check_target_iso
        Check that the provided target ISO is a valid ISO image and is located on a persistent partition.
====> * check_grub_core
        Check whether we are on legacy (BIOS) system and instruct Leapp to upgrade GRUB core
====> * check_target_version
        Check that the target system version is supported by the upgrade process.
====> * check_ipa_server
        Check for ipa-server and inhibit upgrade
====> * check_system_arch
        Check if system is running at a supported architecture. If no, inhibit the upgrade process.
====> * check_yum_plugins_enabled
        Checks that the required yum plugins are enabled.
====> * bacula_check
        Actor checking for presence of Bacula installation.
====> * checktargetrepos
        Check whether target yum repositories are specified.
====> * sssd_check
        Check SSSD configuration for changes in RHEL10 and report them in model.
====> * unsupported_upgrade_check
        Checks environment variables and produces a warning report if the upgrade is unsupported.
====> * cephvolumescan
        Retrieves the list of encrypted Ceph OSD
====> * check_boot_avail_space
        Check if at least 100Mib of available space on /boot. If not, inhibit the upgrade process.
====> * check_default_initramfs
        Checks whether the default initramfs uses problematic dracut modules.
====> * check_cifs
        Check if CIFS filesystem is in use. If yes, inhibit the upgrade process.
====> * check_consumed_assets
        Check whether Leapp is using correct data assets.
====> * check_custom_modifications_actor
        Checks CustomModifications messages and produces a report about files in leapp directories that have been
====> * check_installed_kernels
        Inhibit IPU (in-place upgrade) when installed kernels conflict with a safe upgrade.
====> * check_detected_devices_and_drivers
        Checks whether or not detected devices and drivers are usable on the target system.
====> * check_pam_user_db
        Create report with the location of pam_userdb databases
====> * check_dynamic_linker_configuration
        Check for customization of dynamic linker configuration.
====> * mysql_check
        Actor checking for output produced by scanmysql actor.
====> * check_etc_releasever
        Check releasever info and provide a guidance based on the facts
====> * check_old_xfs
        Check mounted XFS file systems.
====> * check_fips
        Inhibit upgrade if FIPS is detected as enabled.
====> * network_deprecations
        Ensures that network configuration doesn't rely on unsupported settings
====> * check_fstab_mount_order
        Checks order of entries in /etc/fstab based on their mount point and inhibits upgrade if overshadowing is detected.
====> * crypto_policies_check
        This actor consumes previously gathered information about crypto policies on the source
====> * inhibit_cgroupsv1
        Inhibit upgrade if cgroups-v1 are enabled
====> * check_insights_auto_register
        Checks if system can be automatically registered into Red Hat Insights
====> * libdb_check
        Actor checking for presence of libdb(Berkeley DB) installation.
====> * check_rhsmsku
        Ensure the system is subscribed to the subscription manager
====> * openssh_permit_root_login
        OpenSSH no longer allows root logins with password.
====> * mariadb_check
        Actor checking for presence of MariaDB installation.
====> * check_luks
        Check if any encrypted partitions are in use and whether they are supported for the upgrade.
====> * open_ssl_engines_check
        The OpenSSL in RHEL 10 has deprecated engines in favor of providers.
====> * checkmemory
        The actor check the size of RAM against RHEL8 minimal hardware requirements
====> * check_rhsmsca
        Ensure that a registered system is in SCA (Simple Content Access)
====> * check_microarchitecture
        Inhibit if RHEL9 microarchitecture requirements are not satisfied
====> * check_mount_options
        Check for mount options preventing the upgrade.
====> * check_nfs
        Check if NFS filesystem is in use. If yes, inhibit the upgrade process.
====> * check_openssl_conf
        Check whether the openssl configuration and openssl-IBMCA.
====> * check_os_release
        Check if the current RHEL minor version is supported. If not, inhibit the upgrade process.
====> * check_rpm_transaction_events
        Filter RPM transaction events based on installed RPM packages
====> * check_skip_phase
        Skip all the subsequent phases until the report phase.
==> Processing phase `TargetTransactionFactsCollection`
====> * create_iso_repofile
        Create custom repofile containing information about repositories found in target OS installation ISO, if used.
====> * target_userspace_creator
        Initializes a directory to be populated as a minimal environment to run binaries from the target system.
BaseOS for x86_64                               0.0  B/s |   0  B     00:00    

============================================================
                           ERRORS                           
============================================================

2026-01-12 08:59:33.397530 [ERROR] Actor: target_userspace_creator
Message: Unable to install RHEL 10 userspace packages.
Summary:
    Details: Command ['systemd-nspawn', '--register=no', '--quiet', '--keep-unit', '--capability=all', '--pipe', '-D', '/var/lib/leapp/scratch/mounts/root_/system_overlay', '--setenv=LEAPP_UNSUPPORTED=1', '--setenv=LEAPP_DEVEL_RPMS_ALL_SIGNED=1', '--setenv=LEAPP_HOSTNAME=managed-node01', '--setenv=LEAPP_EXPERIMENTAL=0', '--setenv=LEAPP_NO_RHSM=1', '--setenv=LEAPP_NO_RHSM_FACTS=1', '--setenv=LEAPP_TARGET_PRODUCT_CHANNEL=ga', '--setenv=LEAPP_UPGRADE_PATH_TARGET_RELEASE=10.1', '--setenv=LEAPP_UPGRADE_PATH_FLAVOUR=default', '--setenv=LEAPP_IPU_IN_PROGRESS=9to10', '--setenv=LEAPP_EXECUTION_ID=39804b35-9363-48b4-913d-c1c763a4dcc0', '--setenv=LEAPP_COMMON_TOOLS=:/etc/leapp/repos.d/system_upgrade/common/tools:/etc/leapp/repos.d/system_upgrade/el9toel10/tools', '--setenv=LEAPP_COMMON_FILES=:/etc/leapp/repos.d/system_upgrade/common/files:/etc/leapp/repos.d/system_upgrade/el9toel10/files', 'dnf', 'install', '-y', '--setopt=module_platform_id=platform:el10', '--setopt=keepcache=1', '--releasever', '10.1', '--installroot', '/el10target', '--disablerepo', '*', '--enablerepo', 'rhel-10-for-x86_64-baseos-rpms', '--enablerepo', 'rhel-10-for-x86_64-appstream-rpms', 'dnf-command(config-manager)', 'dnf', 'util-linux', '--disableplugin', 'subscription-manager'] failed with exit code 1.
    Stderr: Host and machine ids are equal (ec2dddb9db071e2dd37e6f88ff242637): refusing to link journals
            Error: Failed to download metadata for repo 'rhel-10-for-x86_64-baseos-rpms': Cannot download repomd.xml: Empty mirrorlist and no basepath specified!

============================================================
                       END OF ERRORS                        
============================================================

Debug output written to /var/log/leapp/leapp-preupgrade.log

============================================================
                      REPORT OVERVIEW                       
============================================================

Following errors occurred and the upgrade cannot continue:
    1. Actor: target_userspace_creator
       Message: Unable to install RHEL 10 userspace packages.

HIGH and MEDIUM severity reports:
    1. GRUB2 core will be automatically updated during the upgrade
    2. Upgrade is unsupported
    3. Leapp detected a processor which is no longer maintained in RHEL 10.
    4. Berkeley DB (libdb) has been detected on your system

Reports summary:
    Errors:                      1
    Inhibitors:                  0
    HIGH severity reports:       3
    MEDIUM severity reports:     1
    LOW severity reports:        1
    INFO severity reports:       2

Before continuing, review the full report below for details about discovered problems and possible remediation instructions:
    A report has been generated at /var/log/leapp/leapp-report.txt
    A report has been generated at /var/log/leapp/leapp-report.json

============================================================
                   END OF REPORT OVERVIEW                   
============================================================

Answerfile has been generated at /var/log/leapp/answerfile
Job ended at 2026-01-12T14:00:09Z
", "encoding": "base64", "source": "/var/log/ripu/ripu.log"} RUNNING HANDLER [infra.leapp.common : Decode ripu.log file] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:26 ok: [managed-node01] => {"ansible_facts": {"ripu_log_file": ["RIPU preupgrade analysis", "Job started at 2026-01-12T13:58:58Z", "", "============================================================", " UNSUPPORTED UPGRADE ", "============================================================", "", "Variable LEAPP_UNSUPPORTED has been detected. Proceeding at your own risk.", "Development variables have been detected:", "- LEAPP_DEVEL_RPMS_ALL_SIGNED=1", "", "============================================================", " UNSUPPORTED UPGRADE ", "============================================================", "", "==> Processing phase `configuration_phase`", "====> * ipu_workflow_config", " IPU workflow config actor", "==> Processing phase `FactsCollection`", "====> * open_ssl_config_scanner", " Read an OpenSSL configuration file for further analysis.", "====> * scan_pam_user_db", " Scan the PAM service folder for the location of pam_userdb databases", "====> * storage_scanner", " Provides data about storage settings.", "====> * sssd_facts", " Check SSSD configuration for changes in RHEL10 and report them in model.", "====> * scan_source_boot_entry", " Scan the default boot entry of the source system.", "====> * transaction_workarounds", " Provides additional RPM transaction tasks based on bundled RPM packages.", "====> * repository_mapping", " Produces message containing repository mapping based on provided file.", "====> * ifcfg_scanner", " Scan ifcfg files with legacy network configuration", "====> * root_scanner", " Scan the system root directory and produce a message containing", "====> * scanclienablerepo", " Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.", "====> * system_facts", " Provides data about many facts from system.", "====> * get_enabled_modules", " Provides data about which module streams are enabled on the source system.", "====> * satellite_upgrade_services", " Reconfigure Satellite services", "====> * scan_target_os_image", " Scans the provided target OS ISO image to use as a content source for the IPU, if any.", "====> * luks_scanner", " Provides data about active LUKS devices.", "====> * xfs_info_scanner", " This actor scans all mounted mountpoints for XFS information.", "====> * rpm_scanner", " Provides data about installed RPM Packages.", "====> * scan_systemd_source", " Provides info about systemd on the source system", "====> * scan_default_initramfs", " Scan details of the default boot entry's initramfs image.", "====> * scancryptopolicies", " Scan information about system wide set crypto policies including:", "====> * copy_dnf_conf_into_target_userspace", " Copy dnf.conf into target userspace", "====> * scan_grub_device_name", " Find the name of the block devices where GRUB is located", "====> * scan_custom_modifications_actor", " Collects information about files in leapp directories that have been modified or newly added.", "====> * scan_hybrid_image_azure", " Check if the system is using Azure hybrid image.", "====> * scan_custom_repofile", " Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.", "====> * network_manager_read_config", " Provides data about NetworkManager configuration.", "====> * scandasd", " In case of s390x architecture, check whether DASD is used.", "====> * load_device_driver_deprecation_data", " Loads deprecation data for drivers and devices (PCI & CPU)", "====> * scan_files_for_target_userspace", " Scan the source system and identify files that will be copied into the target userspace when it is created.", "====> * scanmemory", " Scan Memory of the machine.", "====> * pci_devices_scanner", " Provides data about existing PCI Devices.", "====> * scan_grub_config", " Scan grub configuration files for errors.", "====> * scan_sap_hana", " Gathers information related to SAP HANA instances on the system.", "====> * scan_kernel_cmdline", " Scan the kernel command line of the booted system.", "====> * scan_source_files", " Scan files (explicitly specified) of the source system.", "====> * read_openssh_config", " Collect information about the OpenSSH configuration.", "====> * scan_pkg_manager", " Provides data about package manager (yum/dnf)", "====> * migrate_rpm_db", " Register a workaround to migrate RPM DB during the upgrade.", "====> * scanzfcp", " In case of s390x architecture, check whether ZFCP is used.", "====> * udevadm_info", " Produces data exported by the \"udevadm info\" command.", "====> * register_ruby_irb_adjustment", " Register a workaround to allow rubygem-irb's symlink -> directory conversion.", "====> * scan_subscription_manager_info", " Scans the current system for subscription manager information", "====> * persistentnetnames", " Get network interface information for physical ethernet interfaces of the original system.", "====> * remove_obsolete_gpg_keys", " Remove obsoleted RPM GPG keys.", "====> * selinuxcontentscanner", " Scan the system for any SELinux customizations", "====> * distribution_signed_rpm_scanner", " Provide data about distribution signed & third-party RPM packages.", "====> * trusted_gpg_keys_scanner", " Scan for trusted GPG keys.", "====> * ipa_scanner", " Scan system for ipa-client and ipa-server status", "====> * detect_kernel_drivers", " Matches all currently loaded kernel drivers against known deprecated and removed drivers.", "====> * checkrhui", " Check if system is using RHUI infrastructure (on public cloud) and send messages to", "====> * get_installed_desktops", " Actor checks if kde or gnome desktop environments", "====> * biosdevname", " Enable biosdevname on the target RHEL system if all interfaces on the source RHEL", "====> * repositories_blacklist", " Exclude target repositories provided by Red Hat without support.", "====> * scancpu", " Scan CPUs of the machine.", "====> * scan_dynamic_linker_configuration", " Scan the dynamic linker configuration and find modifications.", "====> * scan_fips", " Determine whether the source system has FIPS enabled.", "====> * persistentnetnamesdisable", " Disable systemd-udevd persistent network naming on machine with single eth0 NIC", "====> * rpm_transaction_config_tasks_collector", " Provides additional RPM transaction tasks from /etc/leapp/transaction.", "====> * pes_events_scanner", " Provides data about package events from Package Evolution Service.", "====> * scan_source_kernel", " Scan the source system kernel.", "====> * used_repository_scanner", " Scan used enabled repositories", "====> * scan_mysql", " Actor checking for presence of MySQL installation.", "====> * setuptargetrepos", " Produces list of repositories that should be available to be used during IPU process.", "==> Processing phase `Checks`", "====> * postgresql_check", " Actor checking for presence of PostgreSQL installation.", "====> * efi_check_boot", " Adjust EFI boot entry for first reboot", "====> * check_root_symlinks", " Check if the symlinks /bin and /lib are relative, not absolute.", "====> * check_grubenv_to_file", " Check whether grubenv is a symlink on Azure hybrid images using BIOS.", "====> * detect_grub_config_error", " Check grub configuration for various errors.", "====> * check_persistent_mounts", " Check if mounts required to be persistent are mounted in persistent fashion.", "====> * check_se_linux", " Check SELinux status and produce decision messages for further action.", "====> * check_skipped_repositories", " Produces a report if any repositories enabled on the system are going to be skipped.", "====> * check_systemd_broken_symlinks", " Check whether some systemd symlinks are broken", "====> * check_sap_hana", " If SAP HANA has been detected, several checks are performed to ensure a successful upgrade.", "====> * distribution_signed_rpm_check", " Check if there are any packages that are not signed by distribution GPG keys.", "====> * check_target_iso", " Check that the provided target ISO is a valid ISO image and is located on a persistent partition.", "====> * check_grub_core", " Check whether we are on legacy (BIOS) system and instruct Leapp to upgrade GRUB core", "====> * check_target_version", " Check that the target system version is supported by the upgrade process.", "====> * check_ipa_server", " Check for ipa-server and inhibit upgrade", "====> * check_system_arch", " Check if system is running at a supported architecture. If no, inhibit the upgrade process.", "====> * check_yum_plugins_enabled", " Checks that the required yum plugins are enabled.", "====> * bacula_check", " Actor checking for presence of Bacula installation.", "====> * checktargetrepos", " Check whether target yum repositories are specified.", "====> * sssd_check", " Check SSSD configuration for changes in RHEL10 and report them in model.", "====> * unsupported_upgrade_check", " Checks environment variables and produces a warning report if the upgrade is unsupported.", "====> * cephvolumescan", " Retrieves the list of encrypted Ceph OSD", "====> * check_boot_avail_space", " Check if at least 100Mib of available space on /boot. If not, inhibit the upgrade process.", "====> * check_default_initramfs", " Checks whether the default initramfs uses problematic dracut modules.", "====> * check_cifs", " Check if CIFS filesystem is in use. If yes, inhibit the upgrade process.", "====> * check_consumed_assets", " Check whether Leapp is using correct data assets.", "====> * check_custom_modifications_actor", " Checks CustomModifications messages and produces a report about files in leapp directories that have been", "====> * check_installed_kernels", " Inhibit IPU (in-place upgrade) when installed kernels conflict with a safe upgrade.", "====> * check_detected_devices_and_drivers", " Checks whether or not detected devices and drivers are usable on the target system.", "====> * check_pam_user_db", " Create report with the location of pam_userdb databases", "====> * check_dynamic_linker_configuration", " Check for customization of dynamic linker configuration.", "====> * mysql_check", " Actor checking for output produced by scanmysql actor.", "====> * check_etc_releasever", " Check releasever info and provide a guidance based on the facts", "====> * check_old_xfs", " Check mounted XFS file systems.", "====> * check_fips", " Inhibit upgrade if FIPS is detected as enabled.", "====> * network_deprecations", " Ensures that network configuration doesn't rely on unsupported settings", "====> * check_fstab_mount_order", " Checks order of entries in /etc/fstab based on their mount point and inhibits upgrade if overshadowing is detected.", "====> * crypto_policies_check", " This actor consumes previously gathered information about crypto policies on the source", "====> * inhibit_cgroupsv1", " Inhibit upgrade if cgroups-v1 are enabled", "====> * check_insights_auto_register", " Checks if system can be automatically registered into Red Hat Insights", "====> * libdb_check", " Actor checking for presence of libdb(Berkeley DB) installation.", "====> * check_rhsmsku", " Ensure the system is subscribed to the subscription manager", "====> * openssh_permit_root_login", " OpenSSH no longer allows root logins with password.", "====> * mariadb_check", " Actor checking for presence of MariaDB installation.", "====> * check_luks", " Check if any encrypted partitions are in use and whether they are supported for the upgrade.", "====> * open_ssl_engines_check", " The OpenSSL in RHEL 10 has deprecated engines in favor of providers.", "====> * checkmemory", " The actor check the size of RAM against RHEL8 minimal hardware requirements", "====> * check_rhsmsca", " Ensure that a registered system is in SCA (Simple Content Access)", "====> * check_microarchitecture", " Inhibit if RHEL9 microarchitecture requirements are not satisfied", "====> * check_mount_options", " Check for mount options preventing the upgrade.", "====> * check_nfs", " Check if NFS filesystem is in use. If yes, inhibit the upgrade process.", "====> * check_openssl_conf", " Check whether the openssl configuration and openssl-IBMCA.", "====> * check_os_release", " Check if the current RHEL minor version is supported. If not, inhibit the upgrade process.", "====> * check_rpm_transaction_events", " Filter RPM transaction events based on installed RPM packages", "====> * check_skip_phase", " Skip all the subsequent phases until the report phase.", "==> Processing phase `TargetTransactionFactsCollection`", "====> * create_iso_repofile", " Create custom repofile containing information about repositories found in target OS installation ISO, if used.", "====> * target_userspace_creator", " Initializes a directory to be populated as a minimal environment to run binaries from the target system.", "BaseOS for x86_64 0.0 B/s | 0 B 00:00 ", "", "============================================================", " ERRORS ", "============================================================", "", "2026-01-12 08:59:33.397530 [ERROR] Actor: target_userspace_creator", "Message: Unable to install RHEL 10 userspace packages.", "Summary:", " Details: Command ['systemd-nspawn', '--register=no', '--quiet', '--keep-unit', '--capability=all', '--pipe', '-D', '/var/lib/leapp/scratch/mounts/root_/system_overlay', '--setenv=LEAPP_UNSUPPORTED=1', '--setenv=LEAPP_DEVEL_RPMS_ALL_SIGNED=1', '--setenv=LEAPP_HOSTNAME=managed-node01', '--setenv=LEAPP_EXPERIMENTAL=0', '--setenv=LEAPP_NO_RHSM=1', '--setenv=LEAPP_NO_RHSM_FACTS=1', '--setenv=LEAPP_TARGET_PRODUCT_CHANNEL=ga', '--setenv=LEAPP_UPGRADE_PATH_TARGET_RELEASE=10.1', '--setenv=LEAPP_UPGRADE_PATH_FLAVOUR=default', '--setenv=LEAPP_IPU_IN_PROGRESS=9to10', '--setenv=LEAPP_EXECUTION_ID=39804b35-9363-48b4-913d-c1c763a4dcc0', '--setenv=LEAPP_COMMON_TOOLS=:/etc/leapp/repos.d/system_upgrade/common/tools:/etc/leapp/repos.d/system_upgrade/el9toel10/tools', '--setenv=LEAPP_COMMON_FILES=:/etc/leapp/repos.d/system_upgrade/common/files:/etc/leapp/repos.d/system_upgrade/el9toel10/files', 'dnf', 'install', '-y', '--setopt=module_platform_id=platform:el10', '--setopt=keepcache=1', '--releasever', '10.1', '--installroot', '/el10target', '--disablerepo', '*', '--enablerepo', 'rhel-10-for-x86_64-baseos-rpms', '--enablerepo', 'rhel-10-for-x86_64-appstream-rpms', 'dnf-command(config-manager)', 'dnf', 'util-linux', '--disableplugin', 'subscription-manager'] failed with exit code 1.", " Stderr: Host and machine ids are equal (ec2dddb9db071e2dd37e6f88ff242637): refusing to link journals", " Error: Failed to download metadata for repo 'rhel-10-for-x86_64-baseos-rpms': Cannot download repomd.xml: Empty mirrorlist and no basepath specified!", "", "============================================================", " END OF ERRORS ", "============================================================", "", "Debug output written to /var/log/leapp/leapp-preupgrade.log", "", "============================================================", " REPORT OVERVIEW ", "============================================================", "", "Following errors occurred and the upgrade cannot continue:", " 1. Actor: target_userspace_creator", " Message: Unable to install RHEL 10 userspace packages.", "", "HIGH and MEDIUM severity reports:", " 1. GRUB2 core will be automatically updated during the upgrade", " 2. Upgrade is unsupported", " 3. Leapp detected a processor which is no longer maintained in RHEL 10.", " 4. Berkeley DB (libdb) has been detected on your system", "", "Reports summary:", " Errors: 1", " Inhibitors: 0", " HIGH severity reports: 3", " MEDIUM severity reports: 1", " LOW severity reports: 1", " INFO severity reports: 2", "", "Before continuing, review the full report below for details about discovered problems and possible remediation instructions:", " A report has been generated at /var/log/leapp/leapp-report.txt", " A report has been generated at /var/log/leapp/leapp-report.json", "", "============================================================", " END OF REPORT OVERVIEW ", "============================================================", "", "Answerfile has been generated at /var/log/leapp/answerfile", "Job ended at 2026-01-12T14:00:09Z", ""]}, "changed": false} RUNNING HANDLER [infra.leapp.common : Rename log file] ************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:32 changed: [managed-node01] => {"changed": true, "cmd": "export PATH=$PATH\nmv /var/log/ripu/ripu.log /var/log/ripu/ripu.log-20260112T085724\n", "delta": "0:00:00.005146", "end": "2026-01-12 09:00:10.750177", "msg": "", "rc": 0, "start": "2026-01-12 09:00:10.745031", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} RUNNING HANDLER [infra.leapp.common : Check for log file] ********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:3 ok: [managed-node01] => {"changed": false, "stat": {"exists": false}} RUNNING HANDLER [infra.leapp.common : Add end time to log file] **************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:9 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Slurp ripu.log file] ********************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:19 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Decode ripu.log file] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:26 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Rename log file] ************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:32 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.analysis : Display inhibitors] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/handlers/main.yml:32 skipping: [managed-node01] => {} RUNNING HANDLER [infra.leapp.analysis : Display errors] ************************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/handlers/main.yml:40 ok: [managed-node01] => { "results_errors.stdout_lines": [ "Risk Factor: high (error)", "Title: Unable to install RHEL 10 userspace packages.", "Summary: {\"details\": \"Command ['systemd-nspawn', '--register=no', '--quiet', '--keep-unit', '--capability=all', '--pipe', '-D', '/var/lib/leapp/scratch/mounts/root_/system_overlay', '--setenv=LEAPP_UNSUPPORTED=1', '--setenv=LEAPP_DEVEL_RPMS_ALL_SIGNED=1', '--setenv=LEAPP_HOSTNAME=managed-node01', '--setenv=LEAPP_EXPERIMENTAL=0', '--setenv=LEAPP_NO_RHSM=1', '--setenv=LEAPP_NO_RHSM_FACTS=1', '--setenv=LEAPP_TARGET_PRODUCT_CHANNEL=ga', '--setenv=LEAPP_UPGRADE_PATH_TARGET_RELEASE=10.1', '--setenv=LEAPP_UPGRADE_PATH_FLAVOUR=default', '--setenv=LEAPP_IPU_IN_PROGRESS=9to10', '--setenv=LEAPP_EXECUTION_ID=39804b35-9363-48b4-913d-c1c763a4dcc0', '--setenv=LEAPP_COMMON_TOOLS=:/etc/leapp/repos.d/system_upgrade/common/tools:/etc/leapp/repos.d/system_upgrade/el9toel10/tools', '--setenv=LEAPP_COMMON_FILES=:/etc/leapp/repos.d/system_upgrade/common/files:/etc/leapp/repos.d/system_upgrade/el9toel10/files', 'dnf', 'install', '-y', '--setopt=module_platform_id=platform:el10', '--setopt=keepcache=1', '--releasever', '10.1', '--installroot', '/el10target', '--disablerepo', '*', '--enablerepo', 'rhel-10-for-x86_64-baseos-rpms', '--enablerepo', 'rhel-10-for-x86_64-appstream-rpms', 'dnf-command(config-manager)', 'dnf', 'util-linux', '--disableplugin', 'subscription-manager'] failed with exit code 1.\", \"stderr\": \"Host and machine ids are equal (ec2dddb9db071e2dd37e6f88ff242637): refusing to link journals\\nError: Failed to download metadata for repo 'rhel-10-for-x86_64-baseos-rpms': Cannot download repomd.xml: Empty mirrorlist and no basepath specified!\\n\"}", "Key: cdffc88f6e6f69a6f8e1c86b2b96a9c4f1aa97e1", "----------------------------------------" ] } RUNNING HANDLER [infra.leapp.analysis : Preupgrade analysis report is done] **** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/handlers/main.yml:48 ok: [managed-node01] => { "msg": "The preupgrade analysis report generation is now complete. WARNING: Inhibitors found. Review the tasks above or the result file at /var/log/leapp/leapp-report.txt." } RUNNING HANDLER [infra.leapp.common : Check for log file] ********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:3 ok: [managed-node01] => {"changed": false, "stat": {"exists": false}} RUNNING HANDLER [infra.leapp.common : Add end time to log file] **************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:9 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Slurp ripu.log file] ********************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:19 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Decode ripu.log file] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:26 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Rename log file] ************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:32 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Check for log file] ********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:3 ok: [managed-node01] => {"changed": false, "stat": {"exists": false}} RUNNING HANDLER [infra.leapp.common : Add end time to log file] **************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:9 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Slurp ripu.log file] ********************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:19 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Decode ripu.log file] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:26 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Rename log file] ************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:32 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Check for log file] ********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:3 ok: [managed-node01] => {"changed": false, "stat": {"exists": false}} RUNNING HANDLER [infra.leapp.common : Add end time to log file] **************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:9 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Slurp ripu.log file] ********************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:19 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Decode ripu.log file] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:26 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Rename log file] ************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:32 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Check for log file] ********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:3 ok: [managed-node01] => {"changed": false, "stat": {"exists": false}} RUNNING HANDLER [infra.leapp.common : Add end time to log file] **************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:9 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Slurp ripu.log file] ********************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:19 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Decode ripu.log file] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:26 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Rename log file] ************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:32 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Check for log file] ********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:3 ok: [managed-node01] => {"changed": false, "stat": {"exists": false}} RUNNING HANDLER [infra.leapp.common : Add end time to log file] **************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:9 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Slurp ripu.log file] ********************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:19 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Decode ripu.log file] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:26 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Rename log file] ************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:32 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [common_upgrade_tasks | Run upgrade role] ********************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:103 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [common_upgrade_tasks | Gather verify postupgrade tasks] ****************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:110 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [common_upgrade_tasks | Run verification tasks after upgrade] ************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:118 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [tests_upgrade_custom | Assert that the system has been upgraded] ********* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/tests_upgrade_custom.yml:30 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [tests_upgrade_custom | Mark upgrade as completed] ************************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/tests_upgrade_custom.yml:45 ok: [managed-node01] => {"ansible_facts": {"leapp_upgrade_completed": true}, "changed": false} TASK [tests_upgrade_custom | Cleanup | Remove log files] *********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/tests_upgrade_custom.yml:49 changed: [managed-node01] => {"changed": true, "cmd": "set -euxo pipefail\nrm -f /var/log/leapp/leapp-upgrade.log\nrm -f /var/log/ripu/ripu.log*\n", "delta": "0:00:00.004644", "end": "2026-01-12 09:00:14.390359", "msg": "", "rc": 0, "start": "2026-01-12 09:00:14.385715", "stderr": "+ rm -f /var/log/leapp/leapp-upgrade.log\n+ rm -f /var/log/ripu/ripu.log-20260112T085724", "stderr_lines": ["+ rm -f /var/log/leapp/leapp-upgrade.log", "+ rm -f /var/log/ripu/ripu.log-20260112T085724"], "stdout": "", "stdout_lines": []} PLAY RECAP ********************************************************************* managed-node01 : ok=127 changed=31 unreachable=0 failed=0 skipped=71 rescued=0 ignored=0